Sciweavers

289 search results - page 4 / 58
» Using Slicing to Identify Duplication in Source Code
Sort
View
IWDW
2005
Springer
15 years 3 months ago
Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information
In a fingerprinting scheme a distributor places marks in each copy of a digital object. Placing different marks in different copies, uniquely identifies the recipient of each cop...
Miguel Soriano, Marcel Fernandez, Josep Cotrina Na...
92
Voted
JUCS
2007
80views more  JUCS 2007»
14 years 9 months ago
Higher-Order Lazy Functional Slicing
: Program slicing is a well known family of techniques intended to identify and isolate code fragments which depend on, or are depended upon, specific program entities. This is pa...
Nuno F. Rodrigues, Luís Soares Barbosa
74
Voted
IWPC
2009
IEEE
15 years 4 months ago
Automatically identifying changes that impact code-to-design traceability
An approach is presented that automatically determines if a given source code change impacts the design (i.e., UML class diagram) of the system. This allows code-to-design traceab...
Maen Hammad, Michael L. Collard, Jonathan I. Malet...
82
Voted
JUCS
2006
92views more  JUCS 2006»
14 years 9 months ago
Program Slicing by Calculation
: Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful ...
Nuno F. Rodrigues, Luís Soares Barbosa
DCC
2004
IEEE
15 years 9 months ago
Rate-Distortion Optimized Slicing, Packetization and Coding for Error Resilient Video Transmission
This paper presents an algorithm to optimize the tradeoff between rate and expected end-to-end distortion of a video sequence transmitted over a packet network. The approach optim...
Enrico Masala, Hua Yang, Kenneth Rose, Juan Carlos...