Sciweavers

787 search results - page 91 / 158
» Source code analysis and manipulation
Sort
View
ICSE
2009
IEEE-ACM
14 years 10 months ago
Safe-commit analysis to facilitate team software development
Software development teams exchange source code in shared repositories. These repositories are kept consistent by having developers follow a commit policy, such as "Program e...
Jan Wloka, Barbara G. Ryder, Frank Tip, Xiaoxia Re...
FGR
2002
IEEE
161views Biometrics» more  FGR 2002»
14 years 2 months ago
Baseline Results for the Challenge Problem of Human ID Using Gait Analysis
Identification of people from gait captured on video has become a challenge problem in computer vision. However, there is not a baseline algorithm or standard dataset for measuri...
P. Jonathon Phillips, Patrick Grother, Sudeep Sark...
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
14 years 2 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
LCTRTS
2007
Springer
14 years 4 months ago
Combining source-to-source transformations and processor instruction set extensions for the automated design-space exploration o
Industry’s demand for flexible embedded solutions providing high performance and short time-to-market has led to the development of configurable and extensible processors. The...
Richard Vincent Bennett, Alastair Colin Murray, Bj...
BIBE
2006
IEEE
123views Bioinformatics» more  BIBE 2006»
14 years 4 months ago
Isolation and Visualization of Codon Usage Biases
While genomic sequencing projects have proved an abundant source of information for biological studies ranging from the molecular to the ecological in scale, much of the informati...
Douglas W. Raiford, Dan E. Krane, Travis E. Doom, ...