This paper describes a powerful method for dead code analysis and elimination in the presence of recursive data constructions. We describe partially dead recursive data using live...
Abstract. This paper reports the analysis of an industrial implementation of the session-layer of a load-balancing software system. This software comprises 7.5 thousand lines of C ...
Marko C. J. D. van Eekelen, Stefan ten Hoedt, Ren&...
: In this paper, a hash function construction method based on cell neural network (CNN) with hyper-chaos characteristics is proposed. The chaos sequence is generated by iterating C...
Abstract— We present an analytical study on the error performance of differential unitary space-time modulation (DUSTM) over multiple-input multiple-output (MIMO) channels with n...
Concept location techniques are designed to help isolate sections of source code that relate to specific concepts. Blind Signal Separation techniques like Singular Value Decompos...