Sciweavers

309 search results - page 18 / 62
» Code Transformations for One-Pass Analysis
Sort
View
PEPM
2009
ACM
15 years 7 months ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson
DATE
2003
IEEE
90views Hardware» more  DATE 2003»
15 years 7 months ago
Mapping Applications to an FPFA Tile
Abstract— This paper introduces a transformational design method which can be used to map code written in a high level source language, like C, to a coarse grain reconfigurable ...
Michèl A. J. Rosien, Yuanqing Guo, Gerard J...
ICIP
2007
IEEE
15 years 2 months ago
Analysis of Utility Functions for Video
In this paper, we formulate the utility functions of distortion and Peak Signal-to-Noise Ratio (PSNR) which are generally used for the performance evaluation of video coding appli...
Cheolhong An, Truong Q. Nguyen
POS
2000
Springer
15 years 6 months ago
A Framework for Persistence-Enabled Optimization of Java Object Stores
Abstract. Aggressive optimization of programs often relies on analysis and transformation that cuts across the natural abstraction boundaries of the source programming language, su...
David Whitlock, Antony L. Hosking

Publication
308views
17 years 1 months ago
Measures for Classification and Detection in Steganalysis
Still and multi-media images are subject to transformations for compression, steganographic embedding and digital watermarking. In a major program of activities we are engaged in t...
Sujit Gujar, C E Veni Madhavan