Search

Your search keyword '"Redundant code"' showing total 937 results

Search Constraints

Start Over You searched for: Descriptor "Redundant code" Remove constraint Descriptor: "Redundant code"
937 results on '"Redundant code"'

Search Results

151. Automatic code overlay generation and partially redundant code fetch elimination

152. HYBRID TECHNIQUE FOR SOFTWARE CODE CLONE DETECTION

153. Fortran Legacy software

154. A Source Code Similarity System for Plagiarism Detection

155. Reverse engineering

156. PROGRAM MATCHING THROUGH CODE ANALYSIS AND ARTIFICIAL NEURAL NETWORKS

157. Literate Program Execution for Teaching Computational Science

158. Pinpointing and Hiding Surprising Fragments in an Obfuscated Program

159. A Case Study of User-Defined Code Transformations for Data Layout Optimizations

160. Xevtgen: Fortran Code Transformer Generator for High Performance Scientific Codes

161. A novel approach for bug localization for Exception Handling and Multithreading through mutation

162. ASLR-Guard

163. Heisenbyte

164. Prefix versus Postfix in C++

165. Evaluating the Performance of Erasure Codes

166. Code Speed Measuring for VC++

167. Monitoring aspects for the customization of automatically generated code for big-step models

168. Research for SOA Frame Based on WebSphere Platform

169. An Abstract Model of Certificate Translation

170. Code completion of multiple keywords from abbreviated input

171. Non-Intrusive Structural Coverage for Objective Caml

172. Efficient topology optimization in MATLAB using 88 lines of code

173. An Answer to Schrödinger’s What Is Life?

175. Techniques for Generating and Measuring Production Code Constructs from Controller Models

176. Experimental evaluation of a tool for the verification and transformation of source code in event-driven systems

177. Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

178. Building secure web applications with automatic partitioning

179. Introduction to Microsoft .NET Security

180. Compiling for Reduced Bit-Width Queue Processors

181. A Novel CDMA-BLAST Space-Time Code Scheme

182. Empirical evaluation of clone detection using syntax suffix trees

183. Code analysis and parallelizing vector operations in R

184. Code compression for performance enhancement of variable-length embedded processors

185. Discrimination and Comparison of Digital License for Copyright Management of Software Source Code and CRYPTEX Model

186. Automatic Generation Method of Proxy Client Code to Autonomic Quality Information

187. Secure web applications via automatic partitioning

188. Comparison and Evaluation of Clone Detection Tools

189. Method and implementation for investigating code clones in a software system

190. Finding Clones with Dup: Analysis of an Experiment

191. Automatic Generation of Code Optimizer for DFA Pattern Matching

192. A translation validation framework for symbolic value propagation based equivalence checking of FSMDAs

193. Checking C++ codes for compatibility with operator overloading

194. Mimic: computing models for opaque code

195. Generate and offshore: type-safe and modular code generation for low-level optimization

196. Uncovering Use-After-Free Conditions in Compiled Code

197. A Logic of Programs with Interface-Confined Code

198. Transforming Code with Compositional Mappings for API-Library Switching

199. Letting the Data Lead the Code

200. Duplicate code detection algorithm

Catalog

Books, media, physical & digital resources