Sciweavers

316 search results - page 35 / 64
» Case Study: Extreme Programming in a University Environment
Sort
View
IWPC
2006
IEEE
14 years 2 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere
GECCO
2005
Springer
136views Optimization» more  GECCO 2005»
14 years 2 months ago
Learned mutation strategies in genetic programming for evolution and adaptation of simulated snakebot
In this work we propose an approach of incorporating learned mutation strategies (LMS) in genetic programming (GP) employed for evolution and adaptation of locomotion gaits of sim...
Ivan Tanev
ICSM
2000
IEEE
14 years 1 months ago
Bridging Program Comprehension Tools by Design Navigation
Source code investigation is one of the most time consuming activities during software maintenance and evolution, yet currently available tool support suffers from several shortco...
Sébastien Robitaille, Reinhard Schauer, Rud...
CODES
2007
IEEE
14 years 3 months ago
A framework for rapid system-level exploration, synthesis, and programming of multimedia MP-SoCs
In this paper, we present the Daedalus framework, which allows for traversing the path from sequential application specification to a working MP-SoC prototype in FPGA technology ...
Mark Thompson, Hristo Nikolov, Todor Stefanov, And...
AGENTS
2000
Springer
14 years 1 months ago
Tools for Developing and Monitoring Agents in Distributed Multi-Agent Systems
Before the powerful agent programming paradigm can be adopted in commercial or industrial settings, a complete environment, similar to that for other programming languages, must b...
John R. Graham, Daniel McHugh, Michael Mersic, Fos...