Sciweavers

4979 search results - page 75 / 996
» Batch codes and their applications
Sort
View
VTC
2007
IEEE
15 years 4 months ago
Distance Spectrum Calculation of Symbol Punctured Trellis Coded Modulation
— A special kind of symbol-wise puncturing is applied to the code symbols of a constituent trellis coded modulation (TCM) within two very bandwidth-efficient concatenated coding...
Axel Hof
103
Voted
CAISE
2004
Springer
15 years 3 months ago
Object-Process Methodology (OPM) vs. UML - a Code Generation Perspective
Modeling languages have been evolving at a high pace, encouraging the use of automatic code generators for transforming models to programs. Automatic code generators should enable ...
Iris Reinhartz-Berger, Dov Dori
IEEEARES
2008
IEEE
15 years 4 months ago
Application-Oriented Trust in Distributed Computing
Preserving integrity of applications being executed in remote machines is an open problem. Integrity requires that application code is not tampered with, prior to or during execut...
Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, ...
ACSAC
2001
IEEE
15 years 1 months ago
Application Intrusion Detection using Language Library Calls
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. In this paper we explore the possibility of detecting intrusion at the application...
Anita K. Jones, Yu Lin
SPLC
2008
14 years 11 months ago
Automated Domain-Specific Modeling Languages for Generating Framework-Based Applications
The adoption of Domain-Specific Modeling Languages (DSMLs) for generating framework-based applications has proved to be an effective way of enforcing the correct use of frameworks...
André L. Santos, Kai Koskimies, Antó...