Sciweavers

5962 search results - page 115 / 1193
» Working with Patterns and Code
Sort
View
COMPSAC
2009
IEEE
15 years 8 months ago
Temporally Robust Software Features for Authorship Attribution
Authorship attribution is used to determine the creator of works among many candidates, playing a vital role in software forensics, authorship disputes and academic integrity inve...
Steven Burrows, Alexandra L. Uitdenbogerd, Andrew ...
111
Voted
WEA
2007
Springer
125views Algorithms» more  WEA 2007»
15 years 9 months ago
Simple Compression Code Supporting Random Access and Fast String Matching
Given a sequence S of n symbols over some alphabet Σ, we develop a new compression method that is (i) very simple to implement; (ii) provides O(1) time random access to any symbol...
Kimmo Fredriksson, Fedor Nikitin
143
Voted
RSP
1998
IEEE
126views Control Systems» more  RSP 1998»
15 years 7 months ago
Testing Prototypes Validity to Enhance Code Reuse
The complexity of distributed systems is a problem when designers want to evaluate their safety and liveness. Often, they are built by integration of existing components with newl...
Didier Buchs, A. Diagne, Fabrice Kordon
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
15 years 4 months ago
On hopeful monsters, neutral networks and junk code in evolving L-systems
This paper investigates L-system evolution through experiments with a simulation platform of virtual plants. The conducted simulations vary the occurrence probability of terminal ...
Stefan Bornhofen, Claude Lattaud
130
Voted
ICC
2008
IEEE
126views Communications» more  ICC 2008»
15 years 9 months ago
Network Coding for Two-Way Relaying: Rate Region, Sum Rate and Opportunistic Scheduling
—Network coding for two-way relaying in a three-node network is considered. The achievable rate regions under both traditional four-slot multi-hopping (FSMH) and network coding (...
Chun-Hung Liu, Feng Xue