Sciweavers

478 search results - page 38 / 96
» Working Effectively with Legacy Code
Sort
View
MICRO
2007
IEEE
164views Hardware» more  MICRO 2007»
15 years 4 months ago
A Practical Approach to Exploiting Coarse-Grained Pipeline Parallelism in C Programs
The emergence of multicore processors has heightened the need for effective parallel programming practices. In addition to writing new parallel programs, the next generation of pr...
William Thies, Vikram Chandrasekhar, Saman P. Amar...
PADS
2006
ACM
15 years 4 months ago
A Framework for Robust HLA-based Distributed Simulations
The High Level Architecture (HLA) is a standard for the interoperability and reuse of simulation components, referred to as federates. Large scale HLA-compliant simulations are bu...
Dan Chen, Stephen John Turner, Wentong Cai
SOFTVIS
2010
ACM
14 years 10 months ago
An interactive ambient visualization for code smells
Code smells are characteristics of software that indicate that code may have a design problem. Code smells have been proposed as a way for programmers to recognize the need for re...
Emerson R. Murphy-Hill, Andrew P. Black
ICIP
2004
IEEE
15 years 11 months ago
Multiple-description coding for robust image watermarking
If we treated image watermarking as a communication problem using the image as the communication channel, applying error-correcting codes (ECC) to the watermarking system should i...
Ying-Fen Hsia, Chen-Yao Chang, Jay-Ray Liao
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
15 years 1 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis