Sciweavers

2018 search results - page 78 / 404
» Code Normal Forms
Sort
View
ESEM
2008
ACM
14 years 27 days ago
Iterative identification of fault-prone binaries using in-process metrics
Code churn, the amount of code change taking place within a software unit over time, has been correlated with fault-proneness in software systems. We investigate the use of code c...
Lucas Layman, Gunnar Kudrjavets, Nachiappan Nagapp...
ESORICS
2011
Springer
12 years 11 months ago
Linear Obfuscation to Combat Symbolic Execution
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful t...
Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
ICSE
2010
IEEE-ACM
14 years 3 months ago
Developing and evaluating the code bubbles metaphor
Today’s integrated development environments (IDEs) are hampered by their dependence on files and file-based editing. A novel user interface that is based on collections of light...
Andrew Bragdon
CORR
2008
Springer
79views Education» more  CORR 2008»
13 years 11 months ago
Free Distance Bounds for Protograph-Based Regular LDPC Convolutional Codes
In this paper asymptotic methods are used to form lower bounds on the free distance to constraint length ratio of several ensembles of regular, asymptotically good, protographbased...
David G. M. Mitchell, Ali Emre Pusane, Norbert Goe...
AEI
2002
70views more  AEI 2002»
13 years 11 months ago
A performance-based approach to wheelchair accessible route analysis
This paper presents a method to determine if a usable wheelchair accessible route in a facility exists using motion-planning techniques. We use a `performance-based' approach...
Charles S. Han, Kincho H. Law, Jean-Claude Latombe...