Export 50 results:Author Title [ Type] Year
Filters: First Letter Of Last Name is J [Clear All Filters]
Configuring Software for Reuse with VCL. Proceedings of the 13th Symposium on Programming Languages and Software Tools, SPLST'13. :16–30.. 2013.
Meta-Brokering Solutions for Expanding Grid Middleware Limitations. Euro-Par 2008 Workshops. :199–210.. 2009.
Reference Architecture for Collaborative Working Environments in Rural Areas. Living Labs for Rural Development - Results from the C@R Integrated Project. :53-82.. 2010.
Scalable P2P overlays of very small constant degree: an emerging security threat. Lecture notes in computer science. 5873:399-412.. 2009.
CIASYS – Change Impact Analysis at System Level. Proceedings of the 14th European Conference on Software Maintenance and Reengineering (CSMR'10). :203-206.. 2010.
Code Factoring in GCC. Proceedings of the 2004 GCC Developers' Summit. :79-84.. 2004.
Combining Preprocessor Slicing with C/C++ Language Slicing. Proceedings of the 16th IEEE International Conference on Program Comprehension (ICPC'08). :163-171.. 2008.
Comparison of Different Impact Analysis Methods and Programmer's Opinion – an Empirical Study. Proceedings of the 8th International Conference on the Principles and Practice of Programming in Java (PPPJ'10). :109-118.. 2010.
Computation of Static Execute After Relation with Applications to Software Maintenance. Proceedings of the 2007 IEEE International Conference on Software Maintenance (ICSM'07). :295-304.. 2007.
Configuring Software for Reuse with VCL. Proceedings of the 13th Symposium on Programming Languages and Software Tools (SPLST 2013). :16–30.. 2013.
Designing and Implementing Control Flow Graph for Magic 4th Generation Language. Proceedings of the 13th Symposium on Programming Languages and Software Tools (SPLST 2013). :200–214.. 2013.
Efficient static impact analysis. Sixth Conference of PhD Students in Computer Science. :29.. 2008.
Empirical investigation of SEA-Based dependence cluster properties. IEEE 13th International Working Conference on Source Code Analysis and Manipulation, SCAM 2013. :1–10.. 2013.
General Flow-Sensitive Pointer Analysis and Call Graph Construction. Proceedings of the 9th Symposium on Programming Languages and Software Tools (SPLST 2005). :49–58.. 2005.
Impact Analysis Using Static Execute After in WebKit. Proceedings of the16th European Conference on Software Maintenance and Reengineering (CSMR'12). :95–104.. 2012.
Implementation of a LOTOS precompiler in PROF-LP. Proceedings of the Fourth Conference of Program Designers. :31-36.. 1988.
Interprocedural Static Slicing of Binary Executables. Proceedings of the 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003). :118–127.. 2003.
Investigation of Dynamic Load Balancing in Distributed Memory Multiprocessor Machines. Proc. of 15th Intl. Conf. on Information Technology Interfaces.. 1993.
Learning Phonetic Rules in a Speech Recognition System.. ILP. 1297:37-44.. 1997.
Modeling network-level impacts of P2P flows. 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). :590-594.. 2011.
Relating clusterization measures and software quality. CSMR'13. :345–348.. 2013.
Relating Code Coverage, Mutation Score and Test Suite Reducibility to Defect Density. Proceedings of the 2016 IEEE International Conference on Software Testing, Verification and Validation Workshops: 11th International Workshop on Mutation Analysis (MUTATION'16). :174-179.. 2016.
A Segment-Based Statistical Speech Recognition System for Isolated/continuous Number Recognition. Proceedings of the Fifteenth Annual Symposium on Computational Geometry. :201-211.. 1999.