Sciweavers

787 search results - page 31 / 158
» Source code analysis and manipulation
Sort
View
TIFS
2008
179views more  TIFS 2008»
14 years 9 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
XPU
2007
Springer
15 years 3 months ago
Predicting Software Defect Density: A Case Study on Automated Static Code Analysis
The number of defects is an important indicator of software quality. Agile software development methods put an explicit requirement on automation and permanently low defect rates. ...
Artem Marchenko, Pekka Abrahamsson
IWPC
2009
IEEE
15 years 4 months ago
Who can help me with this change request?
An approach to recommend a ranked list of developers to assist in performing software changes given a textual change request is presented. The approach employs a two-fold strategy...
Huzefa H. Kagdi, Denys Poshyvanyk
INFOCOM
2008
IEEE
15 years 4 months ago
Optimization Based Rate Control for Communication Networks with Inter-Session Network Coding
—In this paper we develop a distributed rate control algorithm for multiple-unicast-sessions when network coding is allowed. Building on our recent flow-based characterization o...
Abdallah Khreishah, Chih-Chun Wang, Ness B. Shroff
66
Voted
ICLP
1989
Springer
15 years 1 months ago
A Simple Code Improvement Scheme for Prolog
The generation of efficient code for Prolog programs requires sophisticated code transformation and optimization systems. Much of the recent work in this area has focussed on hig...
Saumya K. Debray