Sciweavers

848 search results - page 140 / 170
» Understanding Obfuscated Code
Sort
View
PASTE
2010
ACM
13 years 8 months ago
Property-aware program sampling
Monitoring or profiling programs provides us with an understanding for its further improvement and analysis. Typically, for monitoring or profiling, the program is instrumented ...
Harish Narayanappa, Mukul S. Bansal, Hridesh Rajan
ISVC
2010
Springer
13 years 7 months ago
Indented Pixel Tree Plots
We introduce Indented Pixel Tree Plots (IPTPs): a novel pixel-based visualization technique for depicting large hierarchies. It is inspired by the visual metaphor of indented outli...
Michael Burch, Michael Raschke, Daniel Weiskopf
SERP
2010
13 years 7 months ago
The Viability of UML Models in Small Web Applications
As the use of online business systems increase so does the need to produce more efficient and less error prone web based Modeling is a core abstraction mechanism used to manage co...
Jason Dudley, Devon Simmonds
AINA
2010
IEEE
13 years 7 months ago
TCP Testing: How Well Does ns2 Match Reality?
New transport protocols continue to appear as alternatives to the Transmission Control Protocol (TCP). Many of these are are designed to address TCP's inefficiency in operatin...
Martin Bateman, Saleem N. Bhatti
COGCOM
2010
112views more  COGCOM 2010»
13 years 7 months ago
Flexible Latching: A Biologically-Inspired Mechanism for Improving the Management of Homeostatic Goals
Controlling cognitive systems like domestic robots or intelligent assistive environments requires striking an appropriate balance between responsiveness and persistence. Basic goal...
Philipp Rohlfshagen, Joanna Bryson