Sciweavers

267 search results - page 39 / 54
» The Linux kernel as a case study in software evolution
Sort
View
PAMI
2012
13 years 1 days ago
A Blur-Robust Descriptor with Applications to Face Recognition
—Understanding the effect of blur is an important problem in unconstrained visual analysis. We address this problem in the context of image-based recognition, by a fusion of imag...
Raghuraman Gopalan, Sima Taheri, Pavan K. Turaga, ...
ECOOP
2004
Springer
15 years 1 months ago
Early Identification of Incompatibilities in Multi-component Upgrades
Previous work proposed a technique for predicting problems resulting from replacing one version of a software component by another. The technique reports, before performing the rep...
Stephen McCamant, Michael D. Ernst
79
Voted
EUROSYS
2010
ACM
15 years 1 months ago
Locating cache performance bottlenecks using data profiling
Effective use of CPU data caches is critical to good performance, but poor cache use patterns are often hard to spot using existing execution profiling tools. Typical profilers at...
Aleksey Pesterev, Nickolai Zeldovich, Robert T. Mo...
CCS
2003
ACM
15 years 2 months ago
Countering code-injection attacks with instruction-set randomization
We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff’s principle, by creating process-specific randomized ...
Gaurav S. Kc, Angelos D. Keromytis, Vassilis Preve...
100
Voted
IWPC
2008
IEEE
15 years 4 months ago
Identifying Architectural Change Patterns in Object-Oriented Systems
As an object-oriented system evolves, its architecture tends to drift away from the original design. Knowledge of how the system has changed at coarse-grained levels is key to und...
Xinyi Dong, Michael W. Godfrey