Sciweavers

1629 search results - page 292 / 326
» Infeasible Code Detection
Sort
View
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
14 years 3 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
PPPJ
2006
ACM
14 years 3 months ago
The Project Maxwell assembler system
The JavaTM programming language is primarily used for platform-independent programming. Yet it also offers many productivity, maintainability and performance benefits for platfo...
Bernd Mathiske, Douglas N. Simon, Dave Ungar
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
14 years 3 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
IWPC
2005
IEEE
14 years 2 months ago
System Evolution Tracking through Execution Trace Analysis
Software evolution analysis is concerned with analysis of artifacts produced during a software systems life-cycle. Execution traces produced from instrumented code reflect a syst...
Michael Fischer, Johann Oberleitner, Harald Gall, ...
MSR
2005
ACM
14 years 2 months ago
Improving evolvability through refactoring
Refactoring is one means of improving the structure of existing software. Locations for the application of refactoring are often based on subjective perceptions such as ”bad sme...
Jacek Ratzinger, Michael Fischer, Harald Gall