Sciweavers

1005 search results - page 12 / 201
» Software Localization: Issues and Methods
Sort
View
CSREASAM
2007
13 years 9 months ago
Software Protection by Hardware and Obfuscation
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote serv...
Bin Fu, Sai Aravalli, John Abraham
EDM
2010
140views Data Mining» more  EDM 2010»
13 years 9 months ago
Assessing Reviewer's Performance Based on Mining Problem Localization in Peer-Review Data
Current peer-review software lacks intelligence for responding to students' reviewing performance. As an example of an additional intelligent assessment component to such soft...
Wenting Xiong, Diane J. Litman, Christian D. Schun...
SOCO
2010
Springer
13 years 6 months ago
Evaluating a local genetic algorithm as context-independent local search operator for metaheuristics
Local genetic algorithms have been designed with the aim of providing effective intensiļ¬cation. One of their most outstanding features is that they may help classical local searc...
Carlos García-Martínez, Manuel Lozan...
IPPS
2003
IEEE
14 years 25 days ago
Exploiting Java-ILP on a Simultaneous Multi-Trace Instruction Issue (SMTI) Processor
The available Instruction Level Parallelism in Java bytecode (Java-ILP) is not readily exploitable using traditional in-order or out-of-order issue mechanisms due to dependencies ...
R. Achutharaman, R. Govindarajan, G. Hariprakash, ...
KBSE
1997
IEEE
13 years 11 months ago
Applying Concept Formation Methods to Object Identification in Procedural Code
Legacy software systems present a high level of entropy combined with imprecise documentation. This makes their maintenance more difficult, more time consuming, and costlier. In o...
Houari A. Sahraoui, Walcélio L. Melo, Hakim...