Sciweavers

1629 search results - page 10 / 326
» Infeasible Code Detection
Sort
View
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 4 months ago
Binary Repetition Codes and SPC Product Codes for Coded and Cooperative Diversity Systems
— A three stage network protocol that can achieve coded and cooperative diversity to improve network coverage is investigated. In Stage 1, a cyclic redundancy check code is used ...
Pavel Loskot, Norman C. Beaulieu
PEPM
2009
ACM
14 years 2 months ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson
MP
1998
76views more  MP 1998»
13 years 9 months ago
Warm start of the primal-dual method applied in the cutting-plane scheme
A practical warm-start procedure is described for the infeasible primal-dualinterior-point method employed to solve the restricted master problem within the cutting-plane method. ...
Jacek Gondzio
WCRE
2002
IEEE
14 years 3 months ago
Java Quality Assurance by Detecting Code Smells
Software inspection is a known technique for improving software quality. It involves carefully examining the code, the design, and the documentation of software and checking these...
Eva Van Emden, Leon Moonen
QSIC
2009
IEEE
14 years 4 months ago
A Bayesian Approach for the Detection of Code and Design Smells
The presence of code and design smells can have a severe impact on the quality of a program. Consequently, their detection and correction have drawn the attention of both research...
Foutse Khomh, Stéphane Vaucher, Yann-Ga&eum...