Sciweavers

478 search results - page 84 / 96
» Working Effectively with Legacy Code
Sort
View
IWMM
2009
Springer
152views Hardware» more  IWMM 2009»
14 years 1 months ago
A new approach to parallelising tracing algorithms
Tracing algorithms visit reachable nodes in a graph and are central to activities such as garbage collection, marshalling etc. Traditional sequential algorithms use a worklist, re...
Cosmin E. Oancea, Alan Mycroft, Stephen M. Watt
ESTIMEDIA
2007
Springer
14 years 1 months ago
Leveraging Predicated Execution for Multimedia Processing
—Modern compression standards such as H.264, DivX, or VC-1 provide astonishing quality at the costs of steadily increasing processing requirements. Therefore, efficient solution...
Dietmar Ebner, Florian Brandner, Andreas Krall
CCS
2005
ACM
14 years 26 days ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
ASPLOS
2009
ACM
13 years 11 months ago
Efficient online validation with delta execution
Software systems are constantly changing. Patches to fix bugs and patches to add features are all too common. Every change risks breaking a previously working system. Hence admini...
Joseph Tucek, Weiwei Xiong, Yuanyuan Zhou
BMCBI
2010
84views more  BMCBI 2010»
13 years 7 months ago
Word add-in for ontology recognition: semantic enrichment of scientific literature
Background: In the current era of scientific research, efficient communication of information is paramount. As such, the nature of scholarly and scientific communication is changi...
J. Lynn Fink, Pablo Fernicola, Rahul Chandran, Sav...