Sciweavers

787 search results - page 147 / 158
» Source code analysis and manipulation
Sort
View
ICANNGA
2007
Springer
191views Algorithms» more  ICANNGA 2007»
14 years 4 months ago
Novel Multi-layer Non-negative Tensor Factorization with Sparsity Constraints
In this paper we present a new method of 3D non-negative tensor factorization (NTF) that is robust in the presence of noise and has many potential applications, including multi-way...
Andrzej Cichocki, Rafal Zdunek, Seungjin Choi, Rob...
BMCBI
2007
113views more  BMCBI 2007»
13 years 9 months ago
PILER-CR: Fast and accurate identification of CRISPR repeats
Background: Sequencing of prokaryotic genomes has recently revealed the presence of CRISPR elements: short, highly conserved repeats separated by unique sequences of similar lengt...
Robert C. Edgar
PLDI
2010
ACM
14 years 1 months ago
Detecting Inefficiently-Used Containers to Avoid Bloat
Runtime bloat degrades significantly the performance and scalability of software systems. An important source of bloat is the inefficient use of containers. It is expensive to cre...
Guoqing Xu, Atanas Rountev
SIES
2010
IEEE
13 years 7 months ago
A Comparison of Linux CAN Drivers and their Applications
The aim of this paper is to introduce LinCAN, a CAN driver system for Linux, developed at the Department of Control Engineering of the Czech Technical University in Prague, and to ...
Michal Sojka, Pavel Pisa, Martin Petera, Ondrej Sp...
ISSTA
2009
ACM
14 years 4 months ago
HAMPI: a solver for string constraints
Many automatic testing, analysis, and verification techniques for programs can be effectively reduced to a constraint-generation phase followed by a constraint-solving phase. Th...
Adam Kiezun, Vijay Ganesh, Philip J. Guo, Pieter H...