Sciweavers

289 search results - page 49 / 58
» Using Slicing to Identify Duplication in Source Code
Sort
View
ICSE
2007
IEEE-ACM
16 years 1 months ago
Path-Sensitive Inference of Function Precedence Protocols
Function precedence protocols define ordering relations among function calls in a program. In some instances, precedence protocols are well-understood (e.g., a call to pthread mut...
Murali Krishna Ramanathan, Ananth Grama, Suresh Ja...
CICLING
2007
Springer
15 years 8 months ago
Finite-State Technology as a Programming Environment
Finite-state technology is considered the preferred model for representing the phonology and morphology of natural languages. The attractiveness of this technology for natural lang...
Shuly Wintner
IWPC
1999
IEEE
15 years 6 months ago
Reconstructing Ownership Architectures To Help Understand Software Systems
Recent research suggests that large software systems should have a documented system architecture. One form of documentation that may help describe the structure of software syste...
Ivan T. Bowman, Richard C. Holt
TSP
2008
118views more  TSP 2008»
15 years 1 months ago
A Block Component Model-Based Blind DS-CDMA Receiver
In this paper, we consider the problem of blind multiuser separation-equalization in the uplink of a wideband DS-CDMA system, in a multipath propagation environment with intersymbo...
Dimitri Nion, Lieven De Lathauwer
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
15 years 7 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich