Sciweavers

1282 search results - page 138 / 257
» Practical Loss-Resilient Codes
Sort
View
91
Voted
MSR
2010
ACM
15 years 5 months ago
Clones: What is that smell?
—Clones are generally considered bad programming practice in software engineering folklore. They are identified as a bad smell and a major contributor to project maintenance dif...
Foyzur Rahman, Christian Bird, Premkumar T. Devanb...
109
Voted
ACSAC
2002
IEEE
15 years 5 months ago
A Toolkit for Detecting and Analyzing Malicious Software
In this paper we present PEAT: The Portable Executable Analysis Toolkit. It is a software prototype designed to provide a selection of tools that an analyst may use in order to ex...
Michael Weber, Matthew Schmid, Michael Schatz, Dav...
89
Voted
OOPSLA
2001
Springer
15 years 5 months ago
Jiazzi: New-Age Components for Old-Fashioned Java
We present Jiazzi, a system that enables the construction of largescale binary components in Java. Jiazzi components can be thought of as generalizations of Java packages with add...
Sean McDirmid, Matthew Flatt, Wilson C. Hsieh
GSN
2009
Springer
155views Sensor Networks» more  GSN 2009»
15 years 4 months ago
Distributed Network Configuration for Wavelet-Based Compression in Sensor Networks
En-route data compression is fundamental to reduce the power consumed for data gathering in sensor networks. Typical in-network compression schemes involve the distributed computat...
Paula Tarrío, Giuseppe Valenzise, Godwin Sh...
122
Voted
CASSIS
2004
Springer
15 years 4 months ago
Verification of Safety Properties in the Presence of Transactions
The JAVA CARD transaction mechanism can ensure that a sequence of statements either is executed to completion or is not executed at all. Transactions make verification of JAVA CARD...
Reiner Hähnle, Wojciech Mostowski