Sciweavers

3302 search results - page 83 / 661
» Software Is More Than Code
Sort
View
151
Voted
ICICS
2010
Springer
15 years 1 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
139
Voted
WCRE
1999
IEEE
15 years 7 months ago
Experiments with Clustering as a Software Remodularization Method
As valuable software systems get old, reverse engineering becomes more and more important to the companies that have to maintain the code. Clustering is a key activity in reverse ...
Nicolas Anquetil, Timothy Lethbridge
ICC
2007
IEEE
126views Communications» more  ICC 2007»
15 years 7 months ago
User Cooperation Through Network Coding
Abstract-- Most user cooperation protocols work in a timesharing manner, where each user transmits its own message and relays for the other at different segments of a time slot. We...
Meng Yu, Jing Li, Rick S. Blum
IPL
2000
77views more  IPL 2000»
15 years 3 months ago
Efficient loopless generation of Gray codes for k-ary trees
Vajnovszki recently developed a loopless algorithm [Inform. Process. Lett. 68 (1998) 113] to enumerate Gray codes for binary trees, and then Korsh and Lafollette gave a loopless a...
Limin Xiang, Kazuo Ushijima, Changjie Tang
138
Voted
BIRTHDAY
2009
Springer
15 years 10 months ago
Vertical Object Layout and Compression for Fixed Heaps
Research into embedded sensor networks has placed increased focus on the problem of developing reliable and flexible software for microcontroller-class devices. Languages such as ...
Ben Titzer, Jens Palsberg