Sciweavers

46 search results - page 8 / 10
» Tree-pattern-based duplicate code detection
Sort
View
ESE
2008
112views Database» more  ESE 2008»
13 years 7 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
DSN
2003
IEEE
14 years 28 days ago
On the Design of Robust Integrators for Fail-Bounded Control Systems
This paper describes the design and evaluation of a robust integrator for software-implemented control systems. The integrator is constructed as a generic component in the Simulin...
Jonny Vinter, Andréas Johansson, Peter Folk...
DATE
1999
IEEE
71views Hardware» more  DATE 1999»
13 years 12 months ago
Self Recovering Controller and Datapath Codesign
As society has become more reliant on electronics, the need for fault tolerant ICs has increased. This has resulted in signi cant research into both fault tolerant controller desi...
Samuel Norman Hamilton, Alex Orailoglu, Andre Hert...
GFKL
2007
Springer
148views Data Mining» more  GFKL 2007»
14 years 1 months ago
Information Integration of Partially Labeled Data
Abstract. A central task when integrating data from different sources is to detect identical items. For example, price comparison websites have to identify offers for identical p...
Steffen Rendle, Lars Schmidt-Thieme
ICST
2011
IEEE
12 years 11 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...