Sciweavers

1687 search results - page 66 / 338
» Which pointer analysis should I use
Sort
View
129
Voted
CEC
2009
IEEE
15 years 10 months ago
Theoretical analysis of rank-based mutation - combining exploration and exploitation
— Parameter setting is an important issue in the design of evolutionary algorithms. Recently, experimental work has pointed out that it is often not useful to work with a fixed ...
Pietro Simone Oliveto, Per Kristian Lehre, Frank N...
ICPPW
2002
IEEE
15 years 8 months ago
Quantitative Analysis of Transmission Power Control in Wireless Ad-hoc Networks
Abstract—In this paper, we address the issue of transmission power control in wireless ad-hoc networks. In general, it is assumed that minimum transmission power achieves the opt...
Seung-Jong Park, Raghupathy Sivakumar
115
Voted
KBSE
2008
IEEE
15 years 10 months ago
Dependence Anti Patterns
A Dependence Anti Pattern is a dependence structure that may indicate potential problems for on–going software maintenance and evolution. Dependence anti patterns are not struct...
David Binkley, Nicolas Gold, Mark Harman, Zheng Li...
AUSFORENSICS
2004
15 years 5 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
147
Voted
DRM
2005
Springer
15 years 9 months ago
DRM interoperability analysis from the perspective of a layered framework
Interoperability is currently seen as one of the most significant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoper...
Gregory L. Heileman, Pramod A. Jamkhedkar