Sciweavers

3107 search results - page 198 / 622
» Error-Correcting Source Code
Sort
View
ISSTA
2009
ACM
15 years 11 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...
142
Voted
TIT
2002
91views more  TIT 2002»
15 years 4 months ago
On limited-delay lossy coding and filtering of individual sequences
Abstract--We continue the study of adaptive schemes for the sequential lossy coding of individual sequences which was recently initiated by Linder and Lugosi. Specifically, we cons...
Tsachy Weissman, Neri Merhav
CSMR
2009
IEEE
15 years 11 months ago
Static Security Analysis Based on Input-Related Software Faults
It is important to focus on security aspects during the development cycle to deliver reliable software. However, locating security faults in complex systems is difficult and ther...
Csaba Nagy, Spiros Mancoridis
ICC
2008
IEEE
134views Communications» more  ICC 2008»
15 years 11 months ago
Non-Differential DSTBCs for Partially-Coherent Cooperative Communication
— In a distributed space-time coding scheme, based on the relay channel model, the relay nodes co-operate to linearly process the transmitted signal from the source and forward t...
Jagadeesh Harshan, B. Sundar Rajan
WCRE
2005
IEEE
15 years 10 months ago
Enriching Reverse Engineering with Semantic Clustering
Understanding a software system by just analyzing the structure of the system reveals only half of the picture, since the structure tells us only how the code is working but not w...
Adrian Kuhn, Stéphane Ducasse, Tudor G&icir...