Sciweavers

1636 search results - page 31 / 328
» Detecting similar software applications
Sort
View
MICRO
2007
IEEE
159views Hardware» more  MICRO 2007»
14 years 2 months ago
Software-Based Online Detection of Hardware Defects Mechanisms, Architectural Support, and Evaluation
As silicon process technology scales deeper into the nanometer regime, hardware defects are becoming more common. Such defects are bound to hinder the correct operation of future ...
Kypros Constantinides, Onur Mutlu, Todd M. Austin,...
HCI
2009
13 years 6 months ago
Emotion Detection: Application of the Valence Arousal Space for Rapid Biological Usability Testing to Enhance Universal Access
Emotion is an important mental and physiological state, influencing cognition, perception, learning, communication, decision making, etc. It is considered as a definitive important...
Christian Stickel, Martin Ebner, Silke Steinbach-N...
IEEEARES
2010
IEEE
14 years 1 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
CLUSTER
2008
IEEE
14 years 3 months ago
Enabling lock-free concurrent fine-grain access to massive distributed data: Application to supernovae detection
—We consider the problem of efficiently managing massive data in a large-scale distributed environment. We consider data strings of size in the order of Terabytes, shared and ac...
Bogdan Nicolae, Gabriel Antoniu, Luc Bougé
ICSE
2010
IEEE-ACM
13 years 7 months ago
Fourth International Workshop on Software Clones (IWSC)
Software clones are identical or similar pieces of code. They are often the result of copy–and–paste activities as ad-hoc code reuse by programmers. Software clones research i...
Katsuro Inoue, Stanislaw Jarzabek, James R. Cordy,...