Sciweavers

17018 search results - page 181 / 3404
» From the How to the What
Sort
View
ICSE
2010
IEEE-ACM
13 years 8 months ago
Code clone detection in practice
Due to the negative impact of code cloning on software maintenance efforts as well as on program correctness [4–6], the duplication of code is generally viewed as problematic. ...
Florian Deissenboeck, Benjamin Hummel, Elmar J&uum...

Publication
576views
15 years 9 months ago
Within-die Process Variations: How Accurately can They Be Statistically Modeled?
Within-die process variations arise during integrated circuit (IC) fabrication in the sub-100nm regime. These variations are of paramount concern as they deviate the performance of...
Brendan Hargreaves, Henrik Hult, Sherief Reda
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
14 years 10 months ago
Privacy preservation of aggregates in hidden databases: why and how?
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...
Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Cha...
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen
BLISS
2008
IEEE
14 years 4 months ago
Effecting an Improvement to the Fitness Function. How to Evolve a More Identifiable Face
Constructing the face of a criminal from the selection of individual facial parts is a hard task. We have been working on a new system called EvoFIT that involves the selection an...
Charlie D. Frowd, Joanne Park, Alex H. McIntyre, V...