Sciweavers

761 search results - page 85 / 153
» Reverse engineering MAC
Sort
View
UIST
2000
ACM
14 years 13 days ago
Dasher - a data entry interface using continuous gestures and language models
Existing devices for communicating information to computers are bulky, slow to use, or unreliable. Dasher is a new interface incorporating language modelling and driven by continu...
David J. Ward, Alan F. Blackwell, David J. C. MacK...
CCR
2011
13 years 3 months ago
Papyrus: a software platform for distributed dynamic spectrum sharing using SDRs
Proliferation and innovation of wireless technologies require significant amounts of radio spectrum. Recent policy reforms by the FCC are paving the way by freeing up spectrum fo...
Lei Yang, Zengbin Zhang, Wei Hou, Ben Y. Zhao, Hai...
SIGCOMM
2006
ACM
14 years 2 months ago
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
Ratul Mahajan, Maya Rodrig, David Wetherall, John ...
SIGSOFT
2007
ACM
14 years 8 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
WCRE
2009
IEEE
14 years 2 months ago
A Study of the Time Dependence of Code Changes
—Much of modern software development consists of building on older changes. Older periods provide the structure (e.g., functions and data types) on which changes in future period...
Omar Alam, Bram Adams, Ahmed E. Hassan