Sciweavers

762 search results - page 89 / 153
» A study of the uniqueness of source code
Sort
View
133
Voted
CCS
2009
ACM
15 years 9 months ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
154
Voted
ISCAS
2008
IEEE
217views Hardware» more  ISCAS 2008»
15 years 9 months ago
Approximate L0 constrained non-negative matrix and tensor factorization
— Non-negative matrix factorization (NMF), i.e. V ≈ WH where both V, W and H are non-negative has become a widely used blind source separation technique due to its part based r...
Morten Mørup, Kristoffer Hougaard Madsen, L...
141
Voted
HOTOS
2007
IEEE
15 years 6 months ago
HotComments: How to Make Program Comments More Useful?
Program comments have long been used as a common practice for improving inter-programmer communication and code readability, by explicitly specifying programmers' intentions ...
Lin Tan, Ding Yuan, Yuanyuan Zhou
96
Voted
SOSP
2001
ACM
15 years 11 months ago
Information and Control in Gray-Box Systems
In modern systems, developers are often unable to modify the underlying operating system. To build services in such an environment, we advocate the use of gray-box techniques. Whe...
Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
139
Voted
ACHI
2008
IEEE
15 years 9 months ago
Focusing Graphical User Interfaces in Model-Driven Software Development
— To meet fast changing demands on modern software architectures the ambition to shorten and improve software development processes has increased. The approach of model-driven so...
Stefan Link, Thomas Schuster, Philip Hoyer, Sebast...