Sciweavers

1629 search results - page 75 / 326
» Infeasible Code Detection
Sort
View
ICSM
2009
IEEE
15 years 4 months ago
Managing code clones using dynamic change tracking and resolution
Code cloning is widely recognized as a threat to the maintainability of source code. As such, many clone detection and removal strategies have been proposed. However, some clones ...
Michiel de Wit, Andy Zaidman, Arie van Deursen
ASPLOS
1991
ACM
15 years 1 months ago
Code Generation for Streaming: An Access/Execute Mechanism
Access/execute architectures have several advantages over more traditional architectures. Because address generation and memory access are decoupled from operand use, memory laten...
Manuel E. Benitez, Jack W. Davidson
ICASSP
2010
IEEE
14 years 10 months ago
Multipoint-to-point and point-to-multipoint space-time network coding
Traditional cooperative communications can improve communication reliability. However, the simultaneous transmissions from multiple relays are challenging in practice due to the i...
Hung-Quoc Lai, K. J. Ray Liu
AMAI
2004
Springer
15 years 3 months ago
Symmetry Breaking in Constraint Satisfaction with Graph-Isomorphism: Comma-Free Codes
In this paper the use of graph isomorphism is investigated within the framework of symmetry breaking in constraint satisfaction problems. A running example of Comma-free codes is ...
Justin Pearson
ICLP
2010
Springer
15 years 1 months ago
Program analysis for code duplication in logic programs
Abstract. In this PhD project, we deal with the issue of code duplication in logic programs. In particular semantical duplication or redundancy is generally viewed as a possible se...
Celine Dandois