Milos Cvetanovic

  • Citations Per Year
Learn More
Context: Detection of an unauthorized use of a software library is a clone detection problem that in case of commercial products has additional complexity due to the fact that only binary code is available. Objective: The goal of this paper is to propose an approach for estimating the level of similarity between the procedures originating from different(More)
This paper presents a general purpose discrete event simulator, named SLEEP, that helps students to bridge the gap between theory and practice in the domain of Computer Architecture and Organization simulator design. The motivation for developing SLEEP is given after an analysis of simulators available in the open literature. The analysis is followed by(More)
Information extraction from large amount of data is the problem addressed in this paper. Efficient usage of data mining models and algorithms will be presented using the recent IPSI research as a case study. A novel algorithm based on the K-nearest neighbor model has been developed. The algorithm is general enough to be considered as a common solution for a(More)
Compared to control-flow architectures, dataflow architectures usually offer better performances in high performance computing. Moreover, dataflow architectures consume less electrical power. However, only since recently, the technology enables the development of dataflow architectures that are competitive with control-flow architectures. From a programming(More)
This paper presents an optimization algorithm for transactional memory with lazy conflict detection. The proposed optimization attempts to minimize the execution time of restarted transactions. Minimizing happens during restart, by avoiding the re-execution of a section of a transaction that is unaffected by the restart. The proposed optimization builds on(More)
This paper attempts to give a survey of some free software tools for wireless sensor networks. It targets teachers and students who might have the need for education in this area. As a first stage in creating this survey, a process of software collection is presented. First collection step is search through the Shanghai list for the first 50 universities.(More)
  • 1