Sciweavers

2957 search results - page 532 / 592
» Code analysis and CS-XML
Sort
View
CN
2006
117views more  CN 2006»
14 years 12 months ago
Error resilient image transport in wireless sensor networks
In this paper, we propose an "in-network" diversity combining scheme for image transport over wireless sensor networks. We consider a wireless sensor network with both w...
Huaming Wu, Alhussein A. Abouzeid
CORR
2006
Springer
116views Education» more  CORR 2006»
14 years 11 months ago
On the Fading Paper Achievable Region of the Fading MIMO Broadcast Channel
We consider transmission over the ergodic fading multiple-antenna broadcast (MIMO-BC) channel with partial channel state information at the transmitter and full information at the ...
Amir Bennatan, David Burshtein
CORR
2006
Springer
138views Education» more  CORR 2006»
14 years 11 months ago
Applying and Combining Three Different Aspect Mining Techniques
Abstract. Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these conce...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...
IJMMS
2008
90views more  IJMMS 2008»
14 years 11 months ago
Pair programming and the mysterious role of the navigator
Computer programming is generally understood to be highly challenging and since its inception a wide range of approaches, tools and methodologies have been developed to assist in ...
Sallyann Bryant, Pablo Romero, Benedict du Boulay
IJNSEC
2008
150views more  IJNSEC 2008»
14 years 11 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald