Sciweavers

3302 search results - page 83 / 661
» Software Is More Than Code
Sort
View
ICICS
2010
Springer
13 years 8 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
WCRE
1999
IEEE
14 years 2 months ago
Experiments with Clustering as a Software Remodularization Method
As valuable software systems get old, reverse engineering becomes more and more important to the companies that have to maintain the code. Clustering is a key activity in reverse ...
Nicolas Anquetil, Timothy Lethbridge
ICC
2007
IEEE
126views Communications» more  ICC 2007»
14 years 1 months ago
User Cooperation Through Network Coding
Abstract-- Most user cooperation protocols work in a timesharing manner, where each user transmits its own message and relays for the other at different segments of a time slot. We...
Meng Yu, Jing Li, Rick S. Blum
IPL
2000
77views more  IPL 2000»
13 years 9 months ago
Efficient loopless generation of Gray codes for k-ary trees
Vajnovszki recently developed a loopless algorithm [Inform. Process. Lett. 68 (1998) 113] to enumerate Gray codes for binary trees, and then Korsh and Lafollette gave a loopless a...
Limin Xiang, Kazuo Ushijima, Changjie Tang
BIRTHDAY
2009
Springer
14 years 4 months ago
Vertical Object Layout and Compression for Fixed Heaps
Research into embedded sensor networks has placed increased focus on the problem of developing reliable and flexible software for microcontroller-class devices. Languages such as ...
Ben Titzer, Jens Palsberg