Sciweavers

2572 search results - page 328 / 515
» codes 2008
Sort
View
WCRE
2008
IEEE
15 years 10 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou
WCRE
2008
IEEE
15 years 10 months ago
An Empirical Study of Function Clones in Open Source Software
The new hybrid clone detection tool NICAD combines the strengths and overcomes the limitations of both textbased and AST-based clone detection techniques to yield highly accurate ...
Chanchal Kumar Roy, James R. Cordy
WIMOB
2008
IEEE
15 years 10 months ago
On Performance of MIMO Link Adaptation in the Presence of Channel Uncertainty
—In this paper, link level adaptation algorithms in a system applying spatial multiplexing in the presence of channel uncertainty are considered. The first part of this paper de...
Jelena Mirkovic, Bernhard Walke
FAST
2008
15 years 6 months ago
EIO: Error Handling is Occasionally Correct
The reliability of file systems depends in part on how well they propagate errors. We develop a static analysis technique, EDP, that analyzes how file systems and storage device d...
Haryadi S. Gunawi, Cindy Rubio-González, An...
NSDI
2008
15 years 6 months ago
Detecting In-Flight Page Changes with Web Tripwires
While web pages sent over HTTP have no integrity guarantees, it is commonly assumed that such pages are not modified in transit. In this paper, we provide evidence of surprisingly...
Charles Reis, Steven D. Gribble, Tadayoshi Kohno, ...