Sciweavers

289 search results - page 27 / 58
» Using Slicing to Identify Duplication in Source Code
Sort
View
132
Voted
SIGCSE
1992
ACM
178views Education» more  SIGCSE 1992»
15 years 6 months ago
A graphical computer simulator for systems programming courses
on through abstract instructions which approximate, but do not duplicate, the behavior of actual machines. Because they are designed for use in a variety of educational settings, C...
Mark Newsome, Cherri M. Pancake

Publication
167views
15 years 1 months ago
A Network Coding Approach to IP Traceback
Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes these packets traversed. This is useful for tracing the sources of high volume traffic, e...
Pegah Sattari, Minas Gjoka, Athina Markopoulou
124
Voted
CORR
2007
Springer
149views Education» more  CORR 2007»
15 years 1 months ago
Graph Entropy, Network Coding and Guessing games
We introduce the (private) entropy of a directed graph (in a new network coding sense) as well as a number of related concepts. We show that the entropy of a directed graph is ide...
Søren Riis
ECLIPSE
2006
ACM
15 years 7 months ago
Visualization of clone detection results
The goal of a clone detection tool is to identify sections of code that are duplicated in a program. The result of the detection is presented in some manner for the user to view, ...
Robert Tairas, Jeff Gray, Ira D. Baxter
115
Voted
PLDI
1998
ACM
15 years 6 months ago
Exploiting Idle Floating-Point Resources for Integer Execution
In conventional superscalar microarchitectures with partitioned integer and floating-point resources, all floating-point resources are idle during execution of integer programs....
S. Subramanya Sastry, Subbarao Palacharla, James E...