Sciweavers

848 search results - page 28 / 170
» Understanding Obfuscated Code
Sort
View
CORR
2010
Springer
127views Education» more  CORR 2010»
13 years 6 months ago
Towards a communication-theoretic understanding of system-level power consumption
Traditional communication theory focuses on minimizing transmit power. However, communication links are increasingly operating at shorter ranges where transmit power can be signif...
Pulkit Grover, Kristen Ann Woyach, Anant Sahai
IJHPCA
2010
111views more  IJHPCA 2010»
13 years 6 months ago
Understanding Application Performance via Micro-benchmarks on Three Large Supercomputers: Intrepid, Ranger and Jaguar
Emergence of new parallel architectures presents new challenges for application developers. Supercomputers vary in processor speed, network topology, interconnect communication ch...
Abhinav Bhatele, Lukasz Wesolowski, Eric J. Bohm, ...
ICSE
2011
IEEE-ACM
13 years 9 days ago
Understanding broadcast based peer review on open source software projects
Software peer review has proven to be a successful technique in open source software (OSS) development. In contrast to industry, where reviews are typically assigned to specific ...
Peter C. Rigby, Margaret-Anne D. Storey
ECAL
2005
Springer
14 years 2 months ago
The Genetic Coding Style of Digital Organisms
Recently, all the human genes were identified. But understanding the functions coded in the genes is of course a much harder problem. We are used to view DNA as some sort of a comp...
Philip Gerlee, Torbjörn Lundh
POPL
2010
ACM
14 years 6 months ago
A simple, verified validator for software pipelining
Software pipelining is a loop optimization that overlaps the execution of several iterations of a loop to expose more instruction-level parallelism. It can result in first-class p...
Jean-Baptiste Tristan, Xavier Leroy