• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,466
Next 10 →

**Author** c©**Copyright Year* * Astronomical Society of the Pacific Astrophysics Source Code Library Enhancements

by Robert J. Hanisch, Alice Allen, G. Bruce Berriman, Kimberly Duprie, Jessica Mink, Robert J. Nemiroff, Judy Schmidt, Lior Shamir, Mark Taylor, Peter J. Teuben, John Wallin
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

Error Control and Concealment for Video Communication -- A Review

by Yao Wang, Qin-fan Zhu - PROCEEDINGS OF THE IEEE , 1998
"... The problem of error control and concealment in video communication is becoming increasingly important because of the growing interest in video delivery over unreliable channels such as wireless networks and the Internet. This paper reviews the techniques that have been developed for error control a ..."
Abstract - Cited by 438 (13 self) - Add to MetaCart
and concealment in the past ten to fifteen years. These techniques are described in three categories according to the roles that the encoder and decoder play in the underlying approaches. Forward error concealment includes methods that add redundancy at the source end to enhance error resilience of the coded bit

An API for Runtime Code Patching

by Bryan Buck, Jeffrey K. Hollingsworth - The International Journal of High Performance Computing Applications , 2000
"... We present a post-compiler program manipulation tool called Dyninst which provides a C++ class library for program instrumentation. Using this library, it is possible to instrument and modify application programs during execution. A unique feature of this library is that it permits machine-independe ..."
Abstract - Cited by 290 (12 self) - Add to MetaCart
is to edit source code, compile it, and then execute the resulting binary. However, sometimes t...

The Swarm Simulation System: A Toolkit for Building Multi-Agent Simulations

by Nelson Minar, Roger Burkhart , Chris Langton , et al. , 1996
"... Swarm is a multi-agent software platform for the simulation of complex adaptive systems. In the Swarm system the basic unit of simulation is the swarm, a collection of agents executing a schedule of actions. Swarm supports hierarchical modeling approaches whereby agents can be composed of swarms of ..."
Abstract - Cited by 322 (2 self) - Add to MetaCart
of other agents in nested structures. Swarm provides object oriented libraries of reusable components for building models and analyzing, displaying, and controlling experiments on those models. Swarm is currently available as a beta version in full, free source code form. It requires

VPR: A New Packing, Placement and Routing Tool for FPGA Research

by Vaughn Betz, Jonathan Rose , 1997
"... We describe the capabilities of and algorithms used in a new FPGA CAD tool, Versatile Place and Route (VPR). In terms of minimizing routing area, VPR outperforms all published FPGA place and route tools to which we can compare. Although the algorithms used are based on previously known approaches ..."
Abstract - Cited by 322 (15 self) - Add to MetaCart
of targeting a broad range of FPGA architectures, and the source code is publicly available. It and the associated netlist translation / clustering tool VPACK have already been used in a number of research projects worldwide, and should be useful in many areas of FPGA architecture research.

Secure Execution Via Program Shepherding

by Vladimir Kiriansky , Derek Bruening, Saman Amarasinghe , 2002
"... We introduce program shepherding, a method for monitoring control flow transfers during program execution to enforce a security policy. Program shepherding provides three techniques as building blocks for security policies. First, shepherding can restrict execution privileges on the basis of code or ..."
Abstract - Cited by 308 (5 self) - Add to MetaCart
origins. This distinction can ensure that malicious code masquerading as data is never executed, thwarting a large class of security attacks. Second, shepherding can restrict control transfers based on instruction class, source, and target. For example, shepherding can forbid execution of shared library

Visualizing the non-visual: spatial analysis and interaction with information from test documents

by James A. Wise, James J. Thomas, Kelly Pennock, David Lantrip, Marc Pottier, Anne Schur, Vern Crow - In R. Baeza-Yates & B. Ribeiro-Neto (Eds.), Modern information retrieval , 1999
"... This paper describes an approach to IV that involves spatializing text content for enhanced visual browsing and analysis. The application arena is large text document corpora such as digital libraries, regulations andprocedures, archived reports, etc. The basic idea is that text content from these s ..."
Abstract - Cited by 303 (6 self) - Add to MetaCart
This paper describes an approach to IV that involves spatializing text content for enhanced visual browsing and analysis. The application arena is large text document corpora such as digital libraries, regulations andprocedures, archived reports, etc. The basic idea is that text content from

Recovering Documentation-to-Source-Code Traceability Links using Latent Semantic Indexing

by Andrian Marcus, Jonathan I. Maletic
"... An information retrieval technique, latent semantic indexing, is used to automatically identi traceability links from system documentation to program source code. The results of two experiments to identi links in existing software systems (i.e., the LEDA library, and Albergate) are presented. These ..."
Abstract - Cited by 237 (13 self) - Add to MetaCart
An information retrieval technique, latent semantic indexing, is used to automatically identi traceability links from system documentation to program source code. The results of two experiments to identi links in existing software systems (i.e., the LEDA library, and Albergate) are presented

Practices in Code Discoverability: Astrophysics Source Code Library

by Alice Allen, Peter Teuben, Robert J. Nemiroff, Lior Shamir
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

An Implementation of Interprocedural Bounded Regular Section Analysis

by Paul Havlak , Ken Kennedy - IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS , 1991
"... Optimizing compilers should produce efficient code even in the presence of high-level language constructs. However, current programming support systems are significantly lacking in their ability to analyze procedure calls. This deficiency complicates parallel programming, because loops with calls ca ..."
Abstract - Cited by 220 (27 self) - Add to MetaCart
on the Linpack library and a small set of scientific codes.
Next 10 →
Results 1 - 10 of 3,466
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University