Facet browsing currently unavailable
Page 1 of 1161 results
Sort by: relevance publication year
Minimizing impact on JAVA virtual machine via JAVA code optimization PROCEEDINGS ARTICLE published October 2015 in 2015 International Conference on Energy Systems and Applications |
Run-Time Calculation of COSMIC Functional Size via Automatic Installment of Measurement Code into Java Business Applications PROCEEDINGS ARTICLE published August 2015 in 2015 41st Euromicro Conference on Software Engineering and Advanced Applications |
Diversified Remote Code Execution Using Dynamic Obfuscation of Conditional Branches PROCEEDINGS ARTICLE published June 2015 in 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops |
Discarding Low Quality Minutia Cylinder-Code Pairs for Improved Fingerprint Comparison PROCEEDINGS ARTICLE published September 2015 in 2015 International Conference of the Biometrics Special Interest Group (BIOSIG) |
Code complexity estimation for Java programs PROCEEDINGS ARTICLE published November 2015 in 2015 IEEE 13th International Scientific Conference on Informatics |
Java source code defect detection PROCEEDINGS ARTICLE published October 2015 in 2015 8th International Conference on Biomedical Engineering and Informatics (BMEI) |
Data tainting and obfuscation: Improving plausibility of incorrect taint PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) |
Hardware-Assisted Code Obfuscation for FPGA Soft Microprocessors PROCEEDINGS ARTICLE published 2015 in Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015 |
Exploiting and Protecting Dynamic Code Generation PROCEEDINGS ARTICLE published 2015 in Proceedings 2015 Network and Distributed System Security Symposium |
Crowdsourcing Code and Process via Code Hunt PROCEEDINGS ARTICLE published May 2015 in 2015 IEEE/ACM 2nd International Workshop on CrowdSourcing in Software Engineering |
How do Java methods grow? PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) |
A Concept of Value Trace Problem for Java Code Reading Education PROCEEDINGS ARTICLE published July 2015 in 2015 IIAI 4th International Congress on Advanced Applied Informatics |
Complementary code pairs that share the same bandwidth via symmetrical linear FM chips PROCEEDINGS ARTICLE published October 2015 in MILCOM 2015 - 2015 IEEE Military Communications Conference |
Dead code elimination technique in eclipse compiler for Java PROCEEDINGS ARTICLE published December 2015 in 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) |
Signal and receiver design for low-power acoustic communications using m-ary orthogonal code keying PROCEEDINGS ARTICLE published May 2015 in OCEANS 2015 - Genova |
Code selection approach for partitioned cyclic code shift keying to improve multinet capability PROCEEDINGS ARTICLE published October 2015 in MILCOM 2015 - 2015 IEEE Military Communications Conference |
Static code analysis and detection of multiple malicious Java applets using SVM PROCEEDINGS ARTICLE published October 2015 in 2015 International Conference on Green Computing and Internet of Things (ICGCIoT) |
The Politics of code. How digital representations and languages shape culture PROCEEDINGS ARTICLE published 19 June 2015 in Proceedings of ISIS Summit Vienna 2015—The Information Society at the Crossroads |
Automatic Documentation Generation via Source Code Summarization PROCEEDINGS ARTICLE published May 2015 in 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering |
Disqover: Debugging via code sequence covers PROCEEDINGS ARTICLE published November 2015 in 2015 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) |