Sciweavers

1412 search results - page 169 / 283
» The Value of Outsourced Software
Sort
View
ICSM
2009
IEEE
14 years 4 months ago
Managing code clones using dynamic change tracking and resolution
Code cloning is widely recognized as a threat to the maintainability of source code. As such, many clone detection and removal strategies have been proposed. However, some clones ...
Michiel de Wit, Andy Zaidman, Arie van Deursen
UIST
2009
ACM
14 years 4 months ago
Relaxed selection techniques for querying time-series graphs
Time-series graphs are often used to visualize phenomena that change over time. Common tasks include comparing values at different points in time and searching for specified patte...
Christian Holz, Steven Feiner
APSEC
2008
IEEE
14 years 4 months ago
A Heap Model for Java Bytecode to Support Separation Logic
Memory usage analysis is an important problem for resource-constrained mobile devices, especially under mission- or safety-critical circumstances. Program codes running on or bein...
Chenguang Luo, Guanhua He, Shengchao Qin
COMSWARE
2008
IEEE
14 years 4 months ago
DWT-DCT-SVD based watermarking
Some works are reported in the frequency domain watermarking using Single Value Decomposition (SVD). The two most commonly used methods are based on DCT-SVD and DWTSVD. The commonl...
K. A. Navas, M. C. Ajay, M. Lekshmi, T. S. Archana...
CLUSTER
2007
IEEE
14 years 4 months ago
The design of MPI based distributed shared memory systems to support OpenMP on clusters
— OpenMP can be supported in cluster environments by using distributed shared memory (DSM) systems. A portable approach for building DSM systems is to layer it on MPI. With these...
H'sien J. Wong, Alistair P. Rendell