Sciweavers

262 search results - page 38 / 53
» Refactoring Support Based on Code Clone Analysis
Sort
View
MA
2001
Springer
175views Communications» more  MA 2001»
14 years 10 days ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....
SC
2009
ACM
14 years 2 months ago
Scalable temporal order analysis for large scale debugging
We present a scalable temporal order analysis technique that supports debugging of large scale applications by classifying MPI tasks based on their logical program execution order...
Dong H. Ahn, Bronis R. de Supinski, Ignacio Laguna...
CODES
2004
IEEE
13 years 11 months ago
Low energy security optimization in embedded cryptographic systems
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
Catherine H. Gebotys
CISST
2003
88views Hardware» more  CISST 2003»
13 years 9 months ago
Virtual Experts for Imagery Registration and Conflation
The unique human expertise in imagery analysis should be preserved and shared with other imagery analysts to improve image analysis and decision-making. Such knowledge can serve a...
Boris Kovalerchuk, Artemus Harper, Michael Kovaler...
WETICE
2003
IEEE
14 years 1 months ago
Automatic synthesis of coordinators for COTS group-ware applications: an example
The coordination of concurrent activities in collaborative environments is a very important and difficult task. Many approaches for the construction of large-scale flexible grou...
Paola Inverardi, Massimo Tivoli, Antonio Bucchiaro...