Sciweavers

582 search results - page 65 / 117
» Too Much Middleware
Sort
View
DRM
2005
Springer
14 years 1 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
GECCO
2005
Springer
116views Optimization» more  GECCO 2005»
14 years 1 months ago
Terrain generation using genetic algorithms
We propose a method for applying genetic algorithms to create 3D terrain data sets. Existing procedural algorithms for generation of terrain have several shortcomings. The most po...
TeongJoo Ong, Ryan Saunders, John Keyser, John J. ...
IFL
2005
Springer
14 years 1 months ago
Polytypic Syntax Tree Operations
Polytypic functional programming has the advantage that it can derive code for generic functions automatically. However, it is not clear whether it is useful for anything other tha...
Arjen van Weelden, Sjaak Smetsers, Rinus Plasmeije...
LCTRTS
2005
Springer
14 years 1 months ago
Upper bound for defragmenting buddy heaps
Knuth’s buddy system is an attractive algorithm for managing storage allocation, and it can be made to operate in real-time. At some point, storage-management systems must eithe...
Delvin C. Defoe, Sharath R. Cholleti, Ron Cytron
SEKE
2005
Springer
14 years 1 months ago
Javawock: A Java Class Recommender System Based on Collaborative Filtering
- Many software development platforms provide a large number of library components to make it easy to build high quality software. On the other hand, it became more and more diffic...
Masateru Tsunoda, Takeshi Kakimoto, Naoki Ohsugi, ...