Sciweavers

848 search results - page 42 / 170
» Understanding Obfuscated Code
Sort
View
UCS
2004
Springer
14 years 2 months ago
Dependable Coding of Fiducial Tags
Fiducial tags can be recognised successfully and decoded by computer vision systems in order to produce location information. We term a system dependable if its observable results ...
Andrew C. Rice, Christopher B. Cain, John K. Fawce...
EUROGP
2003
Springer
14 years 2 months ago
The Root Causes of Code Growth in Genetic Programming
This paper discusses the underlying pressures responsible for code growth in genetic programming, and shows how an understanding of these pressures can be used to use to eliminate...
Matthew J. Streeter
IWPC
1998
IEEE
14 years 1 months ago
Archetypal Source Code Searches: A Survey of Software Developers and Maintainers
In this study, we conducted a survey to generate archetypes of source code searching by programmers across maintenance tasks. Using a questionnaire on a web page, we obtained 69 r...
Susan Elliott Sim, Charles L. A. Clarke, Richard C...
HPCA
2008
IEEE
14 years 9 months ago
Uncovering hidden loop level parallelism in sequential applications
As multicore systems become the dominant mainstream computing technology, one of the most difficult challenges the industry faces is the software. Applications with large amounts ...
Hongtao Zhong, Mojtaba Mehrara, Steven A. Lieberma...
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
14 years 9 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith