Sciweavers

843 search results - page 72 / 169
» Codes and Projective Multisets
Sort
View
SIGSOFT
2010
ACM
13 years 7 months ago
LINKSTER: enabling efficient manual inspection and annotation of mined data
While many uses of mined software engineering data are automatic in nature, some techniques and studies either require, or can be improved, by manual methods. Unfortunately, manua...
Christian Bird, Adrian Bachmann, Foyzur Rahman, Ab...
ICASSP
2009
IEEE
13 years 7 months ago
Log-likelihood ratio clipping in MIMO-BICM systems: Information geometric analysis and impact on system capacity
The clipping of log-likelihood ratios (LLRs) in soft demodulators for multiple-input multiple-output (MIMO) systems with bitinterleaved coded modulation (BICM) was recently observ...
Stefan Schwandter, Peter Fertl, Clemens Novak, Ger...
AGILEDC
2007
IEEE
14 years 4 months ago
Growing a Build Management System from Seed
This paper describes the authors’ experiences creating a full Build Management System from a simple Version Control System. We will explore how the XP values of simplicity, feed...
Narti Kitiyakara, Joseph Graves
ICSE
2008
IEEE-ACM
14 years 10 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
14 years 2 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider