Sciweavers

4184 search results - page 727 / 837
» A Data Transformation System for Biological Data Sources
Sort
View
MSR
2009
ACM
15 years 10 months ago
The promises and perils of mining git
We are now witnessing the rapid growth of decentralized source code management (DSCM) systems, in which every developer has her own repository. DSCMs facilitate a style of collabo...
Christian Bird, Peter C. Rigby, Earl T. Barr, Davi...
117
Voted
CN
2007
116views more  CN 2007»
15 years 4 months ago
Scalability and security in biased many-to-one communication
In multicast communication, a source transmits the same content to a set of receivers. Current protocols for multicast follow a tree communication model which makes them scalable....
Francesc Sebé, Josep Domingo-Ferrer
CGF
2011
14 years 7 months ago
BSSRDF Estimation from Single Images
We present a novel method to estimate an approximation of the reflectance characteristics of optically thick, homogeneous translucent materials using only a single photograph as ...
Adolfo Muñoz, Jose I. Echevarria, Francisco...
SIGSOFT
2003
ACM
16 years 4 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
OOPSLA
2010
Springer
15 years 2 months ago
G-Finder: routing programming questions closer to the experts
Programming forums are becoming the primary tools for programmers to find answers for their programming problems. Our empirical study of popular programming forums shows that the...
Wei Li, Charles Zhang, Songlin Hu