Sciweavers

298 search results - page 16 / 60
» Towards experimental evaluation of code obfuscation techniqu...
Sort
View
QSIC
2009
IEEE
14 years 3 months ago
Tag-Based Techniques for Black-Box Test Case Prioritization for Service Testing
—A web service may evolve autonomously, making peer web services in the same service composition uncertain as to whether the evolved behaviors may still be compatible to its orig...
Lijun Mei, W. K. Chan, T. H. Tse, Robert G. Merkel
CRIWG
2004
13 years 10 months ago
An Integrated Approach for Analysing and Assessing the Performance of Virtual Learning Groups
Collaborative distance learning involves a variety of elements and factors that have to be considered and measured in order to analyse and assess group and individual performance m...
Thanasis Daradoumis, Alejandra Martínez-Mon...
DAC
1995
ACM
14 years 4 days ago
A Transformation-Based Approach for Storage Optimization
High-level synthesis (HLS) has been successfully targeted towards the digital signal processing (DSP) domain. Both application-speci c integrated circuits (ASICs) and application-...
Wei-Kai Cheng, Youn-Long Lin
PLDI
2005
ACM
14 years 2 months ago
Code placement for improving dynamic branch prediction accuracy
Code placement techniques have traditionally improved instruction fetch bandwidth by increasing instruction locality and decreasing the number of taken branches. However, traditio...
Daniel A. Jiménez
LWA
2004
13 years 10 months ago
Towards Knowledge-Intensive Subgroup Discovery
Subgroup discovery can be applied for exploration or descriptive induction in order to discover "interesting" subgroups of the general population, given a certain proper...
Martin Atzmüller, Frank Puppe, Hans-Peter Bus...