Sciweavers

995 search results - page 186 / 199
» Intrusion ripple analysis in distributed information systems
Sort
View
119
Voted
SIGSOFT
2007
ACM
16 years 12 days ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
119
Voted
SIGSOFT
2003
ACM
16 years 12 days ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
MSR
2006
ACM
15 years 5 months ago
Micro pattern evolution
When analyzing the evolution history of a software project, we wish to develop results that generalize across projects. One approach is to analyze design patterns, permitting char...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
99
Voted
ISPD
2004
ACM
97views Hardware» more  ISPD 2004»
15 years 5 months ago
Implementation and extensibility of an analytic placer
Automated cell placement is a critical problem in VLSI physical design. New analytical placement methods that simultaneously spread cells and optimize wirelength have recently rec...
Andrew B. Kahng, Qinke Wang
SIGCOMM
2010
ACM
14 years 12 months ago
Energy proportionality of an enterprise network
Energy efficiency is becoming increasingly important in the operation of networking infrastructure, especially in enterprise and data center networks. While strategies for lowerin...
Priya Mahadevan, Sujata Banerjee, Puneet Sharma