Sciweavers

852 search results - page 43 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
ICSM
1999
IEEE
15 years 8 months ago
A Language Independent Approach for Detecting Duplicated Code
Code duplication is one of the factors that severely complicates the maintenance and evolution of large software systems. Techniques for detecting duplicated code exist but rely m...
Stéphane Ducasse, Matthias Rieger, Serge De...
CHES
2007
Springer
327views Cryptology» more  CHES 2007»
15 years 10 months ago
On the Power of Bitslice Implementation on Intel Core2 Processor
Abstract. This paper discusses the state-of-the-art fast software implementation of block ciphers on Intel’s new microprocessor Core2, particularly concentrating on “bitslice i...
Mitsuru Matsui, Junko Nakajima
JCP
2007
145views more  JCP 2007»
15 years 4 months ago
AnnAnn and AnnAnn.Net: Tools for Teaching Programming
— It is difficult for a student to learn about programs and to understand the rational that went into the development of the parts that led to the whole. Tools for explaining thi...
Clare J. Hooper, Les Carr, Hugh C. Davis, David E....
CCECE
2006
IEEE
15 years 10 months ago
Survey of Biological High Performance Computing: Algorithms, Implementations and Outlook Research
During recent years there has been an explosive growth of biological data coming from genome projects, proteomics, protein structure determination, and the rapid expansion in digi...
Nasreddine Hireche, J. M. Pierre Langlois, Gabriel...
IADIS
2003
15 years 5 months ago
Informatization and E-Business Model Application for Distributed Data Mining Using Mobile Agents
Distributed data mining (DDM) is the semi-automatic pattern extraction of distributed data sources. The next generation of the data mining studies will be distributed data mining ...
Ezendu Ifeanyi Ariwa, Mohamed B. Senousy, Mohamed ...