Sciweavers

846 search results - page 29 / 170
» On the Evolution of IMEDIA Implementations
Sort
View
INFSOF
2002
153views more  INFSOF 2002»
13 years 8 months ago
Analyzing cloning evolution in the Linux kernel
Identifying code duplication in large multi-platform software systems is a challenging problem. This is due to a variety of reasons including the presence of high-level programmin...
Giuliano Antoniol, Umberto Villano, Ettore Merlo, ...
JDCTA
2010
175views more  JDCTA 2010»
13 years 3 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
CADE
2003
Springer
14 years 9 months ago
The Model Evolution Calculus
The DPLL procedure is the basis of some of the most successful propositional satisfiability solvers to date. Although originally devised as a proofprocedure for first-order logic, ...
Peter Baumgartner, Cesare Tinelli
QSIC
2007
IEEE
14 years 3 months ago
Coping with API Evolution for Running, Mission-Critical Applications Using Virtual Execution Environment
Recent research showed that the majority of compatibility-breaking changes in a component-based, object-oriented software system are refactorings [5]. The software updating proces...
Bashar Gharaibeh, Tien N. Nguyen, J. Morris Chang
CSCW
2004
ACM
14 years 2 months ago
Behind the help desk: evolution of a knowledge management system in a large organization
This paper examines the way in which a knowledge management system (KMS)—by which we mean the people, processes and software—came into being and evolved in response to a varie...
Christine Halverson, Thomas Erickson, Mark S. Acke...