Sciweavers

762 search results - page 89 / 153
» A study of the uniqueness of source code
Sort
View
CCS
2009
ACM
14 years 4 months ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
ISCAS
2008
IEEE
217views Hardware» more  ISCAS 2008»
14 years 3 months ago
Approximate L0 constrained non-negative matrix and tensor factorization
— Non-negative matrix factorization (NMF), i.e. V ≈ WH where both V, W and H are non-negative has become a widely used blind source separation technique due to its part based r...
Morten Mørup, Kristoffer Hougaard Madsen, L...
HOTOS
2007
IEEE
14 years 1 months ago
HotComments: How to Make Program Comments More Useful?
Program comments have long been used as a common practice for improving inter-programmer communication and code readability, by explicitly specifying programmers' intentions ...
Lin Tan, Ding Yuan, Yuanyuan Zhou
SOSP
2001
ACM
14 years 6 months ago
Information and Control in Gray-Box Systems
In modern systems, developers are often unable to modify the underlying operating system. To build services in such an environment, we advocate the use of gray-box techniques. Whe...
Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
ACHI
2008
IEEE
14 years 3 months ago
Focusing Graphical User Interfaces in Model-Driven Software Development
— To meet fast changing demands on modern software architectures the ambition to shorten and improve software development processes has increased. The approach of model-driven so...
Stefan Link, Thomas Schuster, Philip Hoyer, Sebast...