Sciweavers

1953 search results - page 129 / 391
» codes 2010
Sort
View
208
Voted
ICSE
2012
IEEE-ACM
13 years 7 months ago
Debugger Canvas: Industrial experience with the code bubbles paradigm
—At ICSE 2010, the Code Bubbles team from Brown University and the Code Canvas team from Microsoft Research presented similar ideas for new user experiences for an integrated dev...
Robert DeLine, Andrew Bragdon, Kael Rowan, Jens Ja...
160
Voted
WWW
2010
ACM
15 years 11 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
CEC
2010
IEEE
15 years 5 months ago
Evolving a CUDA kernel from an nVidia template
Rather than attempting to evolve a complete program from scratch we demonstrate genetic interface programming (GIP) by automatically generating a parallel CUDA kernel with identica...
William B. Langdon, Mark Harman
SIGPRO
2010
103views more  SIGPRO 2010»
15 years 2 months ago
Optimal design of high-performance separable wavelet filter banks for image coding
An optimization-based method is proposed for the design of high-performance separable wavelet filter banks for image coding. This method yields linear-phase perfect-reconstructio...
Michael D. Adams, Di Xu
180
Voted
TVLSI
2010
14 years 11 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi