Sciweavers

3456 search results - page 3 / 692
» Byte Code Engineering
Sort
View
TIT
1998
71views more  TIT 1998»
13 years 6 months ago
Perfect Byte-Correcting Codes
Tuvi Etzion
PAMI
2012
11 years 9 months ago
Aggregating Local Image Descriptors into Compact Codes
— This paper addresses the problem of large-scale image search. Three constraints have to be taken into account: search accuracy, efficiency, and memory usage. We first present...
Hervé Jégou, Florent Perronnin, Matt...
IWPC
2003
IEEE
14 years 11 days ago
Design Recovery of a Two Level System
Many applications have one or more important modules that are written in a language other than conventional procedural or object oriented languages. These languages are often tran...
Thomas R. Dean, Yuling Chen
FSE
2005
Springer
119views Cryptology» more  FSE 2005»
14 years 18 days ago
The Poly1305-AES Message-Authentication Code
Poly1305-AES is a state-of-the-art message-authentication code suitable for a wide variety of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length messa...
Daniel J. Bernstein
KBSE
2010
IEEE
13 years 5 months ago
Automated program repair through the evolution of assembly code
A method is described for automatically repairing legacy software at the assembly code level using evolutionary computation. The technique is demonstrated on Java byte code and x8...
Eric Schulte, Stephanie Forrest, Westley Weimer