Sciweavers

298 search results - page 31 / 60
» Towards experimental evaluation of code obfuscation techniqu...
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
Abstract—Wireless sensor networks are considered ideal candidates for a wide range of applications. It is desirable and sometimes necessary to reprogram sensor nodes through wire...
An Liu, Peng Ning, Chun Wang
SIGSOFT
2009
ACM
14 years 3 months ago
MSeqGen: object-oriented unit-test generation via mining source code
An objective of unit testing is to achieve high structural coverage of the code under test. Achieving high structural coverage of object-oriented code requires desirable method-ca...
Suresh Thummalapenta, Tao Xie, Nikolai Tillmann, J...
KBSE
2007
IEEE
14 years 2 months ago
Parseweb: a programmer assistant for reusing open source code on the web
Programmers commonly reuse existing frameworks or libraries to reduce software development efforts. One common problem in reusing the existing frameworks or libraries is that the...
Suresh Thummalapenta, Tao Xie
MICRO
1995
IEEE
125views Hardware» more  MICRO 1995»
14 years 5 days ago
Disjoint eager execution: an optimal form of speculative execution
Instruction Level Parallelism (ILP) speedups of an order-of-magnitude or greater may be possible using the techniques described herein. Traditional speculative code execution is t...
Augustus K. Uht, Vijay Sindagi, Kelley Hall
KDD
2007
ACM
160views Data Mining» more  KDD 2007»
14 years 9 months ago
Show me the money!: deriving the pricing power of product features by mining consumer reviews
The increasing pervasiveness of the Internet has dramatically changed the way that consumers shop for goods. Consumergenerated product reviews have become a valuable source of inf...
Nikolay Archak, Anindya Ghose, Panagiotis G. Ipeir...