Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 1161 results
Sort by: relevance publication year

Minimizing impact on JAVA virtual machine via JAVA code optimization

PROCEEDINGS ARTICLE published October 2015 in 2015 International Conference on Energy Systems and Applications

Authors: Vamsi Krishna Myalapalli | Sunitha Geloth

Run-Time Calculation of COSMIC Functional Size via Automatic Installment of Measurement Code into Java Business Applications

PROCEEDINGS ARTICLE published August 2015 in 2015 41st Euromicro Conference on Software Engineering and Advanced Applications

Authors: Rana Gonultas | Ayca Tarhan

Diversified Remote Code Execution Using Dynamic Obfuscation of Conditional Branches

PROCEEDINGS ARTICLE published June 2015 in 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops

Authors: Muhammad Hataba | Reem Elkhouly | Ahmed El-Mahdy

Discarding Low Quality Minutia Cylinder-Code Pairs for Improved Fingerprint Comparison

PROCEEDINGS ARTICLE published September 2015 in 2015 International Conference of the Biometrics Special Interest Group (BIOSIG)

Authors: M. Hamed Izadi | Andrzej Drygajlo

Code complexity estimation for Java programs

PROCEEDINGS ARTICLE published November 2015 in 2015 IEEE 13th International Scientific Conference on Informatics

Authors: Melinda Simon | Zoltan Porkolab | Gabor Horvath

Java source code defect detection

PROCEEDINGS ARTICLE published October 2015 in 2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)

Authors: Hong Zhu | Dahai Jin

Data tainting and obfuscation: Improving plausibility of incorrect taint

PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)

Authors: Sandrine Blazy | Stephanie Riaud | Thomas Sirvent

Hardware-Assisted Code Obfuscation for FPGA Soft Microprocessors

PROCEEDINGS ARTICLE published 2015 in Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015

Authors: Meha Kainth | Lekshmi Krishnan | Chaitra Narayana | Sandesh Gubbi Virupaksha | Russell Tessier

Exploiting and Protecting Dynamic Code Generation

PROCEEDINGS ARTICLE published 2015 in Proceedings 2015 Network and Distributed System Security Symposium

Authors: Chengyu Song | Chao Zhang | Tielei Wang | Wenke Lee | David Melski

Crowdsourcing Code and Process via Code Hunt

PROCEEDINGS ARTICLE published May 2015 in 2015 IEEE/ACM 2nd International Workshop on CrowdSourcing in Software Engineering

Authors: Tao Xie | Judith Bishop | R. Nigel Horspool | Nikolai Tillmann | Jonathan de Halleux

How do Java methods grow?

PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)

Authors: Daniela Steidl | Florian Deissenboeck

A Concept of Value Trace Problem for Java Code Reading Education

PROCEEDINGS ARTICLE published July 2015 in 2015 IIAI 4th International Congress on Advanced Applied Informatics

Authors: Khin Khin Zaw | Nobuo Funabiki

Complementary code pairs that share the same bandwidth via symmetrical linear FM chips

PROCEEDINGS ARTICLE published October 2015 in MILCOM 2015 - 2015 IEEE Military Communications Conference

Authors: Adly T. Fam | Ravi Kadlimatti

Dead code elimination technique in eclipse compiler for Java

PROCEEDINGS ARTICLE published December 2015 in 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)

Authors: Hiral H. Karer | Purvi B. Soni

Signal and receiver design for low-power acoustic communications using m-ary orthogonal code keying

PROCEEDINGS ARTICLE published May 2015 in OCEANS 2015 - Genova

Authors: Benjamin Sherlock | Charalampos C. Tsimenidis | Jeffrey A. Neasham

Code selection approach for partitioned cyclic code shift keying to improve multinet capability

PROCEEDINGS ARTICLE published October 2015 in MILCOM 2015 - 2015 IEEE Military Communications Conference

Authors: Hongjun Noh | Jepung Yu | Kyuman Lee | Jaesung Lim

Static code analysis and detection of multiple malicious Java applets using SVM

PROCEEDINGS ARTICLE published October 2015 in 2015 International Conference on Green Computing and Internet of Things (ICGCIoT)

Authors: Sapana Y. Salunkhe | Tareek M. Pattewar

The Politics of code. How digital representations and languages shape culture

PROCEEDINGS ARTICLE published 19 June 2015 in Proceedings of ISIS Summit Vienna 2015—The Information Society at the Crossroads

Authors: Domenico Fiormonte | Desmond Schmidt | Paolo Monella | Paolo Sordi

Automatic Documentation Generation via Source Code Summarization

PROCEEDINGS ARTICLE published May 2015 in 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering

Authors: Paul W. McBurney

Disqover: Debugging via code sequence covers

PROCEEDINGS ARTICLE published November 2015 in 2015 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)

Authors: Ethar Elsaka | Atif Memon