|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 33114 occurrences of 8244 keywords
|
|
|
Results
Found 58093 publication records. Showing 58080 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Scott Sirowy, Greg Stitt, Frank Vahid |
C is for circuits: capturing FPGA circuits as sequential code for portability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA 16th International Symposium on Field Programmable Gate Arrays, FPGA 2008, Monterey, California, USA, February 24-26, 2008, pp. 117-126, 2008, ACM, 978-1-59593-934-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
sequential code, FPGA, synthesis, portability, circuit design |
17 | Thais Castro, Hugo Fuks, Alberto Nogueira de Castro Júnior |
Detecting Code Evolution in Programming Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBIA ![In: Advances in Artificial Intelligence - SBIA 2008, 19th Brazilian Symposium on Artificial Intelligence, Savador, Brazil, October 26-30, 2008. Proceedings, pp. 145-156, 2008, Springer, 978-3-540-88189-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Supporting Strategies for Code Evolution, Knowledge Representation, Programming Learning |
17 | Thomas Weigert, Frank Weil, Aswin van den Berg, Paul Dietz, Kevin Marth |
Automated Code Generation for Industrial-Strength Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 464-472, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
program transformation, code generation, Model-driven engineering |
17 | Christopher Dragert, Jürgen Dingel, Karen Rudie |
Generation of concurrency control code using discrete-event systems theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGSOFT FSE ![In: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008, Atlanta, Georgia, USA, November 9-14, 2008, pp. 146-157, 2008, ACM, 978-1-59593-995-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
concurrency, model-driven development, control theory, discrete-event systems, automatic code generation |
17 | Wojciech Jaskowski, Krzysztof Krawiec, Bartosz Wieloch |
Multi-task code reuse in genetic programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, Companion Material, pp. 2159-2164, 2008, ACM, 978-1-60558-131-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
genetic programming, code reuse, multi-task learning |
17 | Mohd Fadzli Marhusin, David Cornforth, Henry Larkin |
Malicious Code Detection Architecture Inspired by Human Immune System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 312-317, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
System Call, Malicious Code Detection |
17 | Javed Ferzund, Syed Nadeem Ahsan, Franz Wotawa |
Analysing Bug Prediction Capabilities of Static Code Metrics in Open Source Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSM/Metrikon/Mensura ![In: Software Process and Product Measurement, International Conferences: IWSM 2008, Metrikon 2008, and Mensura 2008, Munich, Germany, November 18-19, 2008. Proceedings, pp. 331-343, 2008, Springer, 978-3-540-89402-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Bug predictor, static code metrics, open source software, empirical software engineering |
17 | Harry M. Sneed |
Measuring 75 Million Lines of Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSM/Metrikon/Mensura ![In: Software Process and Product Measurement, International Conferences: IWSM 2008, Metrikon 2008, and Mensura 2008, Munich, Germany, November 18-19, 2008. Proceedings, pp. 271-286, 2008, Springer, 978-3-540-89402-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Code measurement, complexity and quality metrics, metric database, metric evaluation, size, ISO-9126 |
17 | Jérémy Buisson, Fabien Dagnat |
Introspecting Continuations in Order to Update Active Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotSWUp ![In: Proceedings of the 1st ACM Workshop on Hot Topics in Software Upgrades, HotSWUp 2008, Nashville, TN, USA, October 20, 2008., 2008, ACM, 978-1-60558-304-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
DSU, dynamic update of active code, introspection of execution states, typing, continuation, language construct, control operator |
17 | Zhonglei Wang, Antonio Sánchez, Andreas Herkersdorf |
SciSim: a software performance estimation framework using source code instrumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSP ![In: Proceedings of the 7th International Workshop on Software and Performance, WOSP 2008, Princeton, NJ, USA, June 23-26, 2008, pp. 33-42, 2008, ACM, 978-1-59593-873-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
debugging information, software performance estimation, source code instrumentation, microarchitecture |
17 | Takayuki Omori, Katsuhisa Maruyama |
A change-aware development environment by recording editing operations of source code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSR ![In: Proceedings of the 2008 International Working Conference on Mining Software Repositories, MSR 2008 (Co-located with ICSE), Leipzig, Germany, May 10-11, 2008, Proceedings, pp. 31-34, 2008, ACM, 978-1-60558-024-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
source code modification, versioning systems, software evolution, integrated development environments |
17 | Shao-Yang Wang, Rong-Guey Chang |
Code size reduction by compressing repeated instruction sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 40(3), pp. 319-331, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Repeated instruction sequence, Index table, Instruction table, Register bank, Code compression, Decompression, Instruction prefetching |
17 | R. Krishnan, S. Murali Krishna, Nishil Bharill |
Code quality tools: learning from our experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 32(4), 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
buffer overflow and memory corruption, memory leak, code quality |
17 | Beat Fluri, Michael Würsch, Martin Pinzger 0001, Harald C. Gall |
Change Distilling: Tree Differencing for Fine-Grained Source Code Change Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 33(11), pp. 725-743, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Source code change extraction, tree differencing algorithms, software evolution analysis, software repositories |
17 | Coen De Roover, Theo D'Hondt, Johan Brichau, Carlos Noguera, Laurence Duchien |
Behavioral similarity matching using concrete source code templates in logic queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PEPM ![In: Proceedings of the 2007 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation, 2007, Nice, France, January 15-16, 2007, pp. 92-101, 2007, ACM, 978-1-59593-620-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
logic meta programming, program querying, source code templates, program analysis, pattern detection, program validation |
17 | Sue Jane Jones, Gary E. Burnett |
Spatial skills and navigation of source code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 12th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2007, Dundee, Scotland, UK, June 25-27, 2007, pp. 231-235, 2007, ACM, 978-1-59593-610-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
navigation of source code, programming ability, spatial skills, education |
17 | Hanno Scharwächter, Jonghee M. Youn, Rainer Leupers, Yunheung Paek, Gerd Ascheid, Heinrich Meyr |
A code-generator generator for multi-output instructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODES+ISSS ![In: Proceedings of the 5th International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2007, Salzburg, Austria, September 30 - October 3, 2007, pp. 131-136, 2007, ACM, 978-1-59593-824-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ISS, code-selection, compiler/architecture co-design, ASIP |
17 | Hayo Thielecke |
Frame rules from answer types for code pointers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2006, Charleston, South Carolina, USA, January 11-13, 2006, pp. 309-319, 2006, ACM, 1-59593-027-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
code pointers, polymorphism, continuations, Hoare logic, typed assembly language |
17 | Krishna Sandeep Reddy Dubba, Subrat Kumar Dash, Arun K. Pujari |
New Malicious Code Detection Using Variable Length n-grams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 276-288, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Episodes, Data Mining, n-grams, Malicious code detection |
17 | Yuji Ayatsuka, Jun Rekimoto |
Active CyberCode: a directly controllable 2D code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montréal, Québec, Canada, April 22-27, 2006, pp. 490-495, 2006, ACM, 978-1-59593-298-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
2D code, CyberCode, direct manipulation |
17 | Bernhard Egger 0002, Chihun Kim, Choonki Jang, Yoonsung Nam, Jaejin Lee, Sang Lyul Min |
A dynamic code placement technique for scratchpad memory using postpass optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the 2006 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES 2006, Seoul, Korea, October 22-25, 2006, pp. 223-233, 2006, ACM, 1-59593-543-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
embedded systems, compilers, scratchpad memory, demand paging, code placement, postpass optimization, heterogeneous memory |
17 | Jae-Min Seol, Seong-Whan Kim |
Scalable Fingerprinting Scheme Using Statistically Secure Anti-collusion Code for Large Scale Contents Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 560-569, 2006, Springer, 3-540-36679-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anti-collusion code, Scalable, digital fingerprinting |
17 | Hidetake Uwano, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto |
Analyzing individual performance of source code review using reviewers' eye movement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRA ![In: Proceedings of the Eye Tracking Research & Application Symposium, ETRA 2006, San Diego, California, USA, March 27-29, 2006, pp. 133-140, 2006, ACM, 1-59593-305-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
source code review, human factor, eye movement, computer program |
17 | Zhen Ming Jiang, Ahmed E. Hassan |
Examining the evolution of code comments in PostgreSQL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSR ![In: Proceedings of the 2006 International Workshop on Mining Software Repositories, MSR 2006, Shanghai, China, May 22-23, 2006, pp. 179-180, 2006, ACM, 1-59593-397-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
code comments, software maintenance, software evolution |
17 | Taekyung Kim, Taesuk Oh, Yong Cheol Kim, Seong Jong Choi |
Dirty-Paper Trellis-Code Watermarking with Orthogonal Arcs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PSIVT ![In: Advances in Image and Video Technology, First Pacific Rim Symposium, PSIVT 2006, Hsinchu, Taiwan, December 10-13, 2006, Proceedings, pp. 1103-1112, 2006, Springer, 3-540-68297-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
informed watermarking, orthogonal arc, trellis-code |
17 | Jon Whittle 0001, Richard Kwan, Jyoti Saboo |
From scenarios to code: An air traffic control case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Syst. Model. ![In: Softw. Syst. Model. 4(1), pp. 71-93, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Code generation, Scenario, Case study, State machine, Software modeling |
17 | Ludo Van Put, Bjorn De Sutter, Matias Madou, Bruno De Bus, Dominique Chanet, Kristof Smits, Koen De Bosschere |
LANCET: a nifty code editing tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASTE ![In: Proceedings of the 2005 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, PASTE'05, Lisbon, Portugal, September 5-6, 2005, pp. 75-81, 2005, ACM, 1-59593-239-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
optimization, visualization, instrumentation, assembler, binary code |
17 | Alexander Joseph Ahern, Nobuko Yoshida |
Formalising Java RMI with explicit code mobility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2005, October 16-20, 2005, San Diego, CA, USA, pp. 403-422, 2005, ACM, 1-59593-031-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Java, distribution, optimisation, types, runtime, RMI, code mobility |
17 | Mark W. Bailey |
IRONCODE: think-twice, code-once programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2005, St. Louis, Missouri, USA, February 23-27, 2005, pp. 181-185, 2005, ACM, 1-58113-997-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
correct code, program reading, program writing |
17 | Youfeng Wu, Maurício Breternitz Jr., Herbert H. J. Hum, Ramesh V. Peri, Jay Pickett |
Enhanced code density of embedded CISC processors with echo technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODES+ISSS ![In: Proceedings of the 3rd IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2005, Jersey City, NJ, USA, September 19-21, 2005, pp. 160-165, 2005, ACM, 1-59593-161-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
CISC processors, echo technology, embedded systems, compression, code density |
17 | Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen |
Assessment of Palm OS Susceptibility to Malicious Code Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 240-249, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
mobile operating systems, Palm OS, worms, malicious code |
17 | Meilin Liu, Qingfeng Zhuge, Zili Shao, Chun Xue, Mei Kang Qiu, Edwin Hsing-Mean Sha |
Loop Distribution and Fusion with Timing and Code Size Optimization for Embedded DSPs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing - EUC 2005, International Conference EUC 2005, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 121-130, 2005, Springer, 3-540-30807-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Loop Distribution, Embedded DSP, Scheduling, Code Size, Loop Fusion |
17 | Xiang-Yang Li 0001, Peng-Jun Wan |
Theoretically Good Distributed CDMA/OVSF Code Assignment for Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOON ![In: Computing and Combinatorics, 11th Annual International Conference, COCOON 2005, Kunming, China, August 16-29, 2005, Proceedings, pp. 126-135, 2005, Springer, 3-540-28061-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
CDMA code assignment, wireless networks, throughput, coloring, interference, bottleneck |
17 | Colin D. Walter |
Simple Power Analysis of Unified Code for ECC Double and Add. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 191-204, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
unified code, elliptic curve cryptography, ECC, simple power analysis, SPA, Side channel leakage, Montgomery modular multiplication |
17 | Alastair Dunsmore, Marc Roper, Murray Wood |
The Development and Evaluation of Three Diverse Techniques for Object-Oriented Code Inspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 29(8), pp. 677-686, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Object-oriented, empirical study, software inspection, code reviews |
17 | Jong-Yeol Lee, In-Cheol Park |
Address code generation for DSP instruction-set architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 8(3), pp. 384-395, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
auto-modification addressing, cycle counts, Code size |
17 | Martin E. Nordberg III |
Managing Code Ownership. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 20(2), pp. 26-33, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
software process, software development management, Code ownership |
17 | Qingfeng Zhuge, Zili Shao, Bin Xiao 0001, Edwin Hsing-Mean Sha |
Design space minimization with timing and code size optimization for embedded DSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODES+ISSS ![In: Proceedings of the 1st IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2003, Newport Beach, CA, USA, October 1-3, 2003, pp. 144-149, 2003, ACM, 1-58113-742-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
retiming, unfolding, code size reduction, DSP processors |
17 | Robert Krovetz, Secil Ugurel, C. Lee Giles |
Classification of source code archives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: SIGIR 2003: Proceedings of the 26th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, July 28 - August 1, 2003, Toronto, Canada, pp. 425-426, 2003, ACM, 1-58113-646-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
source code archive, classification, SVM, software reuse |
17 | Kim Mens, Bernard Poll, Sebastián González |
Using Intentional Source-Code Views to Aid Software Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 19th International Conference on Software Maintenance (ICSM 2003), The Architecture of Existing Systems, 22-26 September 2003, Amsterdam, The Netherlands, pp. 169-178, 2003, IEEE Computer Society, 0-7695-1905-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
intentional source-code views, logic metaprogramming, Software maintenance, tool support |
17 | Hillery C. Hunter, Wen-mei W. Hwu |
Code coverage and input variability: effects on architecture and compiler research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the International Conference on Compilers, Architectures and Synthesis for Embedded Systems, CASES 2002, Greenoble, France, October 8-11, 2002, pp. 79-87, 2002, ACM, 1-58113-575-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
architecture, compiler, benchmarks, DSP, telecommunications, code coverage |
17 | Yunjian Jiang, Robert K. Brayton |
Logic optimization and code generation for embedded control applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODES ![In: Proceedings of the Ninth International Symposium on Hardware/Software Codesign, CODES 2001, Copenhagen, Denmark, 2001, pp. 225-229, 2001, ACM, 1-58113-364-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
code generation, MDD, Esterel, logic optimization, multiple-valued |
17 | Cecilia Metra, Jien-Chung Lo |
Intermediacy Prediction for High Speed Berger Code Checkers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 16(6), pp. 607-615, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
self-checking circuits, checkers, Berger code |
17 | Shail Aditya, Scott A. Mahlke, B. Ramakrishna Rau |
Code size minimization and retargetable assembly for custom EPIC and VLIW instruction formats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 5(4), pp. 752-773, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
code size minimization, custom templates, instruction format design, noop compression, retargetable assembly, VLIW, design automation, EPIC |
17 | Zen Chen, I-Pin Chen |
Recursive Conversion of Chain Code into Quadtree with Table Lookup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 15th International Conference on Pattern Recognition, ICPR'00, Barcelona, Spain, September 3-8, 2000., pp. 6054-6057, 2000, IEEE Computer Society, 0-7695-0750-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Recursive conversion, Quadtree, Table lookup, Chain Code |
17 | Liliana Favre, Liliana Martinez, Claudia Pereira |
Transforming UML Static Models into Object-Oriented Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TOOLS (37) ![In: TOOLS Pacific 2000: 37th International Conference on Technology of Object-Oriented Languages and Systems, Sydney, Australia, November 2000, pp. 170-181, 2000, IEEE Computer Society, 0-7695-0918-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
UML static models, reuse based rigorous method, object oriented code generation, rigorous process, GSBL/sup OO/ language, SpReIm model, OCL specifications, object-oriented programming, software maintenance, software maintenance, specification languages, software reusability, program compilers, object-oriented languages, algebraic specification, algebraic specifications, reusable components, UML class diagrams, forward engineering, design artifacts |
17 | William Currie Colket |
Code analysis of saftey-critical and real-time software using ASIS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGAda ![In: Proceedings ACM SIGAda Annual International Conference, SIGAda 1999, The Engineering of Industrial Strength Real-Time Software & Distributed Systems: Using Ada and Related Technologie, Redondo Beach, CA, USA, October 17-21, 1999., pp. 67-76, 1999, ACM, 1-58113-127-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
real-time, tasking, safety-critical, code analysis, ASIS, high integrity, Ada language, Ravenscar profile |
17 | Colin O'Halloran, Alf Smith |
Verification of Picture Generated Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: The 14th IEEE International Conference on Automated Software Engineering, ASE 1999, Cocoa Beach, Florida, USA, 12-15 October 1999, pp. 127-136, 1999, IEEE Computer Society, 0-7695-0415-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Ada, Z, Automatic Code Generation, Proof, Simulink, SPARK, Control Laws |
17 | Oliver Rüthing |
Optimal Code Motion in the Presence of Large Expressions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCL ![In: Proceedings of the 1998 International Conference on Computer Languages, ICCL 1998, Chicago, IL, USA, May 14-16, 1998, pp. 216-, 1998, IEEE Computer Society, 0-8186-8454-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
partial redundancy, graph theory, register allocation, graph matching, program optimization, code motion, elimination |
17 | Tommy Thorne |
Programming Languages for Mobile Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 29(3), pp. 213-239, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Limbo, Obliq, Safe-Tcl, telescript, security, Java, formal methods, object orientation, distribution, safety, portability, mobile code, network programming, Objective Caml |
17 | Andreas Schade |
Automatic Generation of Bridging Code for Accessing C++ from Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TOOLS (25) ![In: TOOLS 1997: 25th International Conference on Technology of Object-Oriented Languages and Systems, 24-28 November 1997, Melbourne, Australia, pp. 165-180, 1997, IEEE Computer Society, 0-8186-8485-2. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Language mapping, Representative classes, Code generation |
17 | Stan Y. Liao, Srinivas Devadas, Kurt Keutzer, Steven W. K. Tjiang |
Instruction selection using binate covering for code size optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: Proceedings of the 1995 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 1995, San Jose, California, USA, November 5-9, 1995, pp. 393-399, 1995, IEEE Computer Society / ACM, 0-8186-7213-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
code generation, digital signal processors, instruction selection |
17 | Eugene Joseph, Theodosios Pavlidis |
Bar Code Waveform Recognition Using Peak Locations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 16(6), pp. 630-640, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
bar code waveform recognition, peak locations, blurred waveforms, blurring process, waveform peaks, waveform deblurring, edge detection, parameter estimation, statistical analysis, histogram, statistical pattern recognition, zero crossings, noise tolerance, bar codes, edge features |
17 | Jens Knoop, Oliver Rüthing, Bernhard Steffen |
Optimal Code Motion: Theory and Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 16(4), pp. 1117-1155, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
t-refined flow graphs, critical edges, elimination of partial redundancies, lifetimes of registers, nondeterministic flowgraphs, data flow analysis, code motion, lifetime optimality, computational optimality |
17 | Chen Wei, Hong Nie, Zhizhang (David) Chen |
Non-Data-Aided Code Synchronization for the Code-Shifted Reference Ultra-Wideband (UWB) System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: 8th Annual Conference on Communication Networks and Services Research, CNSR 2010, 11-14 May 2010, Montreal, Canada, pp. 56-60, 2010, IEEE Computer Society, 978-0-7695-4041-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Code-shifted reference, synchronization, ultra wideband, Euclidean distance, impulse radio |
17 | Dejan Baca |
Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 386-390, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
dua, security, data flow, coverity, Static code analysis, taint analysis, findbugs |
17 | Siamak Najjar Karimi, Saeed Parsa |
Semi-automatic Transformation of Sequential Code to Distributed Code Using Model Driven Architecture Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, Chengdu, Sichuan, China, 10-12 August 2009, pp. 708-714, 2009, IEEE Computer Society, 978-0-7695-3747-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Model Driven Architecture, PIM, PSM, distributed code |
17 | Liz Burd, Stephen Rank |
Using Automated Source Code Analysis for Software Evolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 206-212, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Evolution, Source Code Analysis, Call-Graph, Dominance Tree |
17 | Chryssis Georgiou, Nancy A. Lynch, Panayiotis Mavrommatis, Joshua A. Tauber |
Automated implementation of complex distributed algorithms specified in the IOA language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Tools Technol. Transf. ![In: Int. J. Softw. Tools Technol. Transf. 11(2), pp. 153-171, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Input/Output automata, Verifiable distributed code, IOA Toolkit, Formal methods, Automated code generator |
17 | Claude Castelluccia, Aurélien Francillon, Daniele Perito, Claudio Soriente |
On the difficulty of software-based attestation of embedded devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 400-409, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
indisputable code execution, return-oriented programming, software-based attestation, swatt, wireless sensor networks, embedded systems, code compression |
17 | Santonu Sarkar, Renuka Sindhgatta, Krishnakumar Pooloth |
A collaborative platform for application knowledge management in software maintenance projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bangalore Compute Conf. ![In: Proceedings of the 1st Bangalore Annual Compute Conference, Compute 2008, Bangalore, India, January 18-20, 2008, pp. 2, 2008, ACM, 978-1-59593-950-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed maintenance, collaboration, code analysis, code search |
17 | Suresh Thummalapenta, Tao Xie 0001 |
SpotWeb: detecting framework hotspots via mining open source repositories on the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSR ![In: Proceedings of the 2008 International Working Conference on Mining Software Repositories, MSR 2008 (Co-located with ICSE), Leipzig, Germany, May 10-11, 2008, Proceedings, pp. 109-112, 2008, ACM, 978-1-60558-024-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
code search engine, hotspots, code reuse |
17 | Brenda S. Baker |
Finding Clones with Dup: Analysis of an Experiment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 33(9), pp. 608-621, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
softwareclones, duplicated code, Redundant code |
17 | Vladimir D. Tonchev, Hao Wang |
An algorithm for optimal difference systems of sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comb. Optim. ![In: J. Comb. Optim. 14(2-3), pp. 165-175, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Code synchronization, Comma-free code, Difference system of sets, Cyclic difference set |
17 | Lingxiao Jiang, Zhendong Su 0001, Edwin Chiu |
Context-based detection of clone-related bugs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007, Dubrovnik, Croatia, September 3-7, 2007, pp. 55-64, 2007, ACM, 978-1-59593-811-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
code clone detection, code clone-related bugs, context-based bug detection, inconsistencies |
17 | Bingyu Liao, Hong Yuan, Baojun Lin |
Smoother and Bayesian filter based semi-codeless tracking of dual-frequency GPS signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 49(4), pp. 533-544, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
P(Y) code, W code, A/S technology, adapted median filter, GPS, Bayesian filter |
17 | Koichi Kamijo, Noboru Kamijo, Masaharu Sakamoto |
Electronic clipping system with invisible barcodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 14th ACM International Conference on Multimedia, Santa Barbara, CA, USA, October 23-27, 2006, pp. 753-762, 2006, ACM, 1-59593-447-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
2D bar code, invisible ink, uv LED, ubiquitous, cell phone, QR code |
17 | E. J. Cheon, Takao Kato, Seon Jeong Kim |
Nonexistence of [n, 5, d]q Codes Attaining the Griesmer Bound for q4-2q2-2q+1 <= d <= q4-2q2-q. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 36(3), pp. 289-299, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
projective code, linear code, projective space, Griesmer bound |
17 | Rafail Ostrovsky, William E. Skeith III |
Private Searching on Streaming Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 223-240, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Crypto-computing, Public-key Encryption with special properties, Privacy-Preserving Keyword Search, Secure Algorithms for Streaming Data, Privacy-Preserving Datamining, Secure Delegation of Computation, Searching with Privacy, Software security, Mobile code, Database security, Private Information Retrieval, Code Obfuscation |
17 | Søren Debois |
Imperative program optimization by partial evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PEPM ![In: Proceedings of the 2004 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation, 2004, Verona, Italy, August 24-25, 2004, pp. 113-122, 2004, ACM, 1-58113-835-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
loop-invariant code motion, bisimulation, strength reduction, code duplication |
17 | Ramaswamy Govindarajan, Hongbo Yang, José Nelson Amaral, Chihong Zhang, Guang R. Gao |
Minimum Register Instruction Sequencing to Reduce Register Spills in Out-of-Order Issue Superscalar Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 52(1), pp. 4-20, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
code sequence optimization, code generation, Compiler optimization, instruction level parallelism, register allocation, instruction scheduling, superscalar architectures |
17 | Roy Friedman, Achour Mostéfaoui, Sergio Rajsbaum, Michel Raynal |
Distributed Agreement and Its Relation with Error-Correcting Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 16th International Conference, DISC 2002, Toulouse, France, October 28-30, 2002 Proceedings, pp. 63-87, 2002, Springer, 3-540-00073-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Erroneous Value, Fault-Tolerance, Distributed Computing, Error-Correcting Code, Consensus, Hamming Distance, Asynchronous Distributed System, Condition, Crash Failure, Code Theory, Interactive Consistency |
17 | Gérard D. Cohen, Iiro S. Honkala, Antoine Lobstein, Gilles Zémor |
On Codes Identifying Vertices in the Two-Dimensional Square Lattice with Diagonals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 50(2), pp. 174-176, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
square lattice, identifying code, Graph, code |
17 | Guang Yang, Ivan Tomek |
Team Lab: A Collaborative Environment for Teamwork. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRIWG ![In: 6th International Workshop on Groupware (CRIWG 2000), 18-20 October 2000, Madeira, Portugal, pp. 142-145, 2000, IEEE Computer Society, 0-7695-0828-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Team Lab, geographical separation, code development, concurrent programming activity, central code repository, software development, efficiency, programming environments, quality, productivity, collaborative virtual environment, teamwork, collaborative environment, client-server application, software development teams |
17 | Xinan Tang, Rakesh Ghiya, Laurie J. Hendren, Guang R. Gao |
Heap Analysis and Optimizations for Threaded Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE PACT ![In: Proceedings of the 1997 Conference on Parallel Architectures and Compilation Techniques (PACT '97), San Francisco, CA, USA, October 11-15, 1997, pp. 14-25, 1997, IEEE Computer Society, 0-8186-8090-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
threaded programs, traditional compiler optimizations, loop invariant removal, common sub-expression elimination, dynamically allocated data structures, heap pointer analyses, dependence testing, high quality code generation, EARTH-C compiler, generated multithreaded code, dynamic measurements, performance tradeoffs, optimizations, parallel programming, optimizing compilers, multithreaded architectures, multithreaded programs, heap analysis |
17 | Jeffrey K. Hollingsworth, Barton P. Miller, M. J. R. Goncalves, Oscar Naim, Zhichen Xu, Ling Zheng |
MDL: A Language and Compiler for Dynamic Program Instrumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE PACT ![In: Proceedings of the 1997 Conference on Parallel Architectures and Compilation Techniques (PACT '97), San Francisco, CA, USA, October 11-15, 1997, pp. 201-, 1997, IEEE Computer Society, 0-8186-8090-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
dynamic program instrumentation, running programs, instrumentation code, PA-RISC, Power 2 architecture, Alpha architecture, x86 architecture, Metric Description Language, Paradyn Parallel Performance Tools, platform independent descriptions, message channels, modules, MDL, nodes, procedures, application program, compiler generators, SPARC, files, dynamic code generation, performance data |
17 | Seongbae Park, SangMin Shim, Soo-Mook Moon |
Evaluation of Scheduling Techniques on a SPARC-based VLIW Testbed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: Proceedings of the Thirtieth Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 30, Research Triangle Park, North Carolina, USA, December 1-3, 1997, pp. 104-113, 1997, ACM/IEEE Computer Society, 0-8186-7977-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
SPARC-based VLIW testbed, VLIW microprocessors, Very Long Instruction Word microprocessors, all-path speculation, gcc-generated optimized SPARC code, high-performance VLIW code, nongreedy enhanced pipeline scheduling, nonspeculative operations, profile-based all-path speculation, restricted speculative loads, scheduling compiler, speculative operations, trace-based speculation, performance, compiler, computer architecture, parallel machines, software pipelining, loop unrolling, renaming, memory disambiguation, copies, scheduling techniques |
17 | Berndt Bellay, Harald C. Gall |
A Comparison of Four Reverse Engineering Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCRE ![In: 4th Working Conference on Reverse Engineering, WCRE '97, Amsterdam, The Netherlands, October 6-8, 1997, pp. 2-11, 1997, IEEE Computer Society, 0-8186-8162-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
reverse engineering tools, complex software systems analysis, maintenance activities, browsing capabilities, graphical reports, commercial reverse engineering tools, source code languages, C source code, Refine/C, Imagix4D, Sniff+, commercial embedded software system, embedded software systems, software engineers, reverse engineering, Rigi |
17 | Cecilia Metra, Michele Favalli, Bruno Riccò |
Highly testable and compact single output comparator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 15th IEEE VLSI Test Symposium (VTS'97), April 27-May 1, 1997, Monterey, California, USA, pp. 210-215, 1997, IEEE Computer Society, 0-8186-7810-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
comparators (circuits), single output comparator, self-checking n-input comparator, n-variable two-rail checker, equality checker, strongly code-disjoint, input code words, embedded comparators, VLSI, fault detection, totally-self-checking |
17 | R. E. Niemeyer |
Using Web Technologies in Two MLS Environments: A Security Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 205-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks |
17 | Iiro S. Honkala, Yrjö Kaipainen, Aimo Tietäväinen |
Long binary narrow-sense BCH codes are normal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 8(1), pp. 49-55, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Finite fields, Code, Covering radius, BCH code, Character sum |
17 | Jens Knoop, Bernhard Steffen, Jürgen Vollmer 0001 |
Parallelism for Free: Efficient and Optimal Bitvector Analyses for Parallel Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 18(3), pp. 268-299, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
assignment motion, bitvector problems, definition-use chains, partial dead-code elimination, parallelism, synchronization, shared memory, data flow analysis, program optimization, code motion, strength reduction, interleaving semantics |
17 | Stefan Fischer 0001, Jacek Wytrebowicz, Stanislaw Budkowski |
Hardware/Software Co-Design of Communication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 22rd EUROMICRO Conference '96, Beyond 2000: Hardware and Software Design Strategies, September 2-5, 1996, Prague, Czech Republic, pp. 476-483, 1996, IEEE Computer Society, 0-8186-7487-3. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
high performance distributed systems, system design techniques, standardized formal language Estelle, VHDL code, video-on-demand example, multimedia systems, multimedia systems, communication protocols, hardware/software codesign, C code |
17 | Jennifer Rexford, James W. Dolter, Wu-chang Feng, Kang G. Shin |
PP-MEss-SIM: a simulator for evaluating multicomputer interconnection networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 28st Annual Simulation Symposium (SS '95), April 25-28, 1995, Santa Barbara, California, USA, pp. 84-, 1995, IEEE Computer Society, 0-8186-7091-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
PP-MEss-SIM, multicomputer interconnection network evaluation, object-oriented discrete-event simulation environment, communication workloads, routing-switching algorithms, router models, low-level device specification, code decoupling, independent code development, application workloads, object-oriented programming, virtual machines, multiprocessor interconnection networks, discrete event simulation, network topology, network topologies, network design, high-level architectures, network routing |
17 | Ryutaro Murakami, Yoshiteru Ohkura, Ryosaku Shimada |
2k-ary Cyclic AN Codes for Burst Error Correction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMVL ![In: 25th IEEE International Symposium on Multiple-Valued Logic, ISMVL 1995, Bloomington, Indiana, USA, May 23-25, 1995, Proceedings, pp. 228-235, 1995, IEEE Computer Society, 0-8186-7118-1. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
2/sup k/-ary cyclic AN codes, burst error correction, radix 2/sup k/ expressions, code structure, arithmetic burst errors, burst error correction ability, binary cyclic AN code, error correction codes, error detection, error detection codes, arithmetic codes, arithmetic operations, cyclic codes |
17 | Michel Cosnard, Michel Loi |
Automatic task graph generation techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (2) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 113-122, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
automatic task graph generation techniques, parameterized task graph, problem-size-independent representation, directed acylic task graphs, annotated sequential program, node computational load, edge communication volume, local data structure generation, computation code generation, communication code generation, parallel programming, data structures, directed graphs, programming theory, automatic programming, parallel computation model |
17 | Mircea R. Stan, Wayne P. Burleson |
Coding a terminated bus for low power. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Great Lakes Symposium on VLSI ![In: 5th Great Lakes Symposium on VLSI (GLS-VLSI '95), March 16-18, 1995, The State University of New York at Buffalo, USA, pp. 70-73, 1995, IEEE Computer Society, 0-8186-7035-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
pull-up terminators, bus liner, limited-weight codes, parallel terminated buses, Rambus, perfect k/2-limited weight code, nonperfect 3-limited weight code, error correction codes, encoding, decoding, power dissipation, random-access storage, system buses |
17 | E. M. Osman, Grace Baratta-Perez, Thomas J. Walsh 0002, Kenneth J. Fowler |
A unique tool set for engineering complex systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), November 6-10, 1995, Fort Lauderdale, Florida, USA, pp. 234-, 1995, IEEE Computer Society, 0-8186-7123-8. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
tool set, life-cycle management, large-system features, Ada 83, C System Dependency Analyzers, Ada 83 Common Code Recognizer, Ada 83 Tasking Identifier, Rate Monotonic Analysis Scheduler, source code analysis tools, software engineering, reliability, software architecture, Ada, Ada, software maintenance, software tools, complex systems, portability, maintainability, software portability, software systems, porting |
17 | Hongxia Jin, Serdar Pehlivanoglu |
Traitor Tracing without A Priori Bound on the Coalition Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 234-241, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Christopher Ferguson, Qijun Gu, Hongchi Shi |
Self-healing control flow protection in sensor applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 213-224, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
sensor application, access control, self healing, tinyos, control flow |
17 | Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John McLean |
Applying Formal Methods to a Certifiably Secure Software System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 34(1), pp. 82-98, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, verification, Formal methods, Specification, Software, tools, software verification, security kernels |
17 | Raffaele Mascella, Luca G. Tallini |
Efficient m-Ary Balanced Codes which Are Invariant under Symbol Permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(8), pp. 929-946, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Coding and information theory, m{hbox{-}}rm ary communication, line codes, DC-free communication, delay-insensitive communication, error control codes, digital communication, constant weight codes, balanced codes |
17 | Jinghu Chen, R. Michael Tanner |
A Hybrid Coding Scheme for the Gilbert-Elliott Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 54(9), pp. 1703-1703, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Joshua J. Bloch |
How to design a good API and why it matters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2006, October 22-26, 2006, Portland, Oregon, USA, pp. 506-507, 2006, ACM, 1-59593-491-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Manuel Fähndrich, Michael Carbin, James R. Larus |
Reflective program generation with patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPCE ![In: Generative Programming and Component Engineering, 5th International Conference, GPCE 2006, Portland, Oregon, USA, October 22-26, 2006, Proceedings, pp. 275-284, 2006, ACM, 1-59593-237-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
patterns, reflection, generative programming, templates |
17 | Elena Gabriela Barrantes, David H. Ackley, Stephanie Forrest, Darko Stefanovic |
Randomized instruction set emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 8(1), pp. 3-40, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Automated diversity, randomized instruction sets, software diversity |
17 | Guosen Yue, Xiaodong Wang 0001 |
Optimization of irregular repeat accumulate codes for MIMO systems with iterative receivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 4(6), pp. 2843-2855, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Michael W. Hicks, Scott Nettles |
Dynamic software updating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 27(6), pp. 1049-1096, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
typed assembly language, Dynamic software updating |
17 | Mika Mäntylä |
An experiment on subjective evolvability evaluation of object-oriented software: explaining factors and interrater agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISESE ![In: 2005 International Symposium on Empirical Software Engineering (ISESE 2005), 17-18 November 2005, Noosa Heads, Australia, pp. 287-296, 2005, IEEE Computer Society, 0-7803-9507-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Steffen Tarnick |
Design of Embedded Self-Testing Checkers for t-UED and BUED Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 20(5), pp. 465-477, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
t-unidirectional error detecting (t-UED) codes, burst unidirectional error detecting (BUED) codes, averaging circuits, embedded checkers, self-testing checkers |
|
|