Sciweavers

1687 search results - page 77 / 338
» Which pointer analysis should I use
Sort
View
CANDT
2009
15 years 7 months ago
An analysis of the social structure of remix culture
We present findings from our study of a music sharing and remixing community in an effort to quantify and understand the structural characteristics of commons-based peer productio...
Giorgos Cheliotis, Jude Yew
AOSD
2009
ACM
15 years 1 months ago
Concept analysis for product line requirements
Traditional methods characterize a software product line's requirements using either functional or quality criteria. This appears to be inadequate to assess modularity, detec...
Nan Niu, Steve M. Easterbrook
BMCBI
2011
14 years 7 months ago
Study of large and highly stratified population datasets by combining iterative pruning principal component analysis and STRUCTU
Background: The ever increasing sizes of population genetic datasets pose great challenges for population structure analysis. The Tracy-Widom (TW) statistical test is widely used ...
Tulaya Limpiti, Apichart Intarapanich, Anunchai As...
ICC
2009
IEEE
148views Communications» more  ICC 2009»
15 years 10 months ago
Analysis of Probabilistic Flooding: How Do We Choose the Right Coin?
Abstract—This paper studies probabilistic information dissemination in random networks. Consider the following scenario: A node intends to deliver a message to all other nodes in...
Sérgio Crisóstomo, Udo Schilcher, Ch...
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
15 years 10 months ago
An Analysis of the Compact XSL Attack on BES and Embedded SMS4
The XSL attack when applied on BES-128 has been shown to have an attack complexity of 2100 , which is faster than exhaustive search. However at FSE 2007, Lim and Khoo analyzed the ...
Jiali Choy, Huihui Yap, Khoongming Khoo