Sciweavers

762 search results - page 77 / 153
» A study of the uniqueness of source code
Sort
View
TWC
2008
140views more  TWC 2008»
13 years 8 months ago
On the Performance of Spectrally-Encoded Spread-Time Ultrawideband CDMA Communication Systems
In this paper we study the performance of Spectrally-Encoded Spread-Time (SE/ST) technique when applied to ultrawideband (UWB) signals in the context of wireless code-division mult...
Mahmoud Farhang, Jawad A. Salehi
ICST
2009
IEEE
14 years 3 months ago
The Effectiveness of Automated Static Analysis Tools for Fault Detection and Refactoring Prediction
Many automated static analysis (ASA) tools have been developed in recent years for detecting software anomalies. The aim of these tools is to help developers to eliminate software...
Fadi Wedyan, Dalal Alrmuny, James M. Bieman
KBSE
2007
IEEE
14 years 3 months ago
Keyword programming in java
Keyword programming is a novel technique for reducing the need to remember details of programming language syntax and APIs, by translating a small number of keywords provided by t...
Greg Little, Robert C. Miller
HOTOS
2003
IEEE
14 years 2 months ago
Cosy: Develop in User-Land, Run in Kernel-Mode
User applications that move a lot of data across the user-kernel boundary suffer from a serious performance penalty. We provide a framework, Compound System Calls (CoSy), to enhan...
Amit Purohit, Charles P. Wright, Joseph Spadavecch...
AAECC
2003
Springer
139views Algorithms» more  AAECC 2003»
14 years 2 months ago
Fighting Two Pirates
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which i...
Hans Georg Schaathun