Sciweavers

942 search results - page 61 / 189
» From System Comprehension to Program Comprehension
Sort
View
ACISICIS
2007
IEEE
14 years 3 months ago
Slicing Aided Design of Obfuscating Transforms
Abstract—An obfuscation aims to transform a program, without affecting its functionality, so that some secret information within the program can be hidden for as long as possible...
Stephen Drape, Anirban Majumdar, Clark D. Thombors...
ISCC
2007
IEEE
109views Communications» more  ISCC 2007»
14 years 3 months ago
Embeddable Overlay Networks
—The accuracy of network coordinate (NC) which is comprehensively applied is suffering seriously from Triangle Inequality Violations (TIVs). A novel approach - Embeddable Overlay...
Eng Keong Lua, Timothy G. Griffin
BMCBI
2005
108views more  BMCBI 2005»
13 years 8 months ago
Storing, linking, and mining microarray databases using SRS
Background: SRS (Sequence Retrieval System) has proven to be a valuable platform for storing, linking, and querying biological databases. Due to the availability of a broad range ...
Antoine Veldhoven, Don de Lange, Marcel Smid, Vict...
APSEC
2009
IEEE
14 years 3 months ago
Assessing and Estimating Corrective, Enhancive, and Reductive Maintenance Tasks: A Controlled Experiment
— This paper describes a controlled experiment of student programmers performing maintenance tasks on a C++ program. The goal of the study is to assess the maintenance size, effo...
Vu Nguyen, Barry W. Boehm, Phongphan Danphitsanuph...
VLDB
1992
ACM
83views Database» more  VLDB 1992»
14 years 23 days ago
A Performance Study of Alternative Object Faulting and Pointer Swizzling Strategies
This paper presents a portable, efficient method for accessing memory resident persistent objects in virtual memory in the context of the E programming language. Under the approac...
Seth J. White, David J. DeWitt