Sciweavers

3107 search results - page 209 / 622
» Error-Correcting Source Code
Sort
View
SAC
2010
ACM
15 years 5 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 11 months ago
Design of Collaborative Codes Achieving Space-Time Diversity
— In wireless networks, the use of collaboration has been shown to provide an increase in reliability due to an increase in diversity. Specifically it has been shown that by havi...
Patrick Tooher, Hesam Khoshneviss, M. Reza Soleyma...
ICIP
2007
IEEE
16 years 6 months ago
Adaptive Hash-Based Side Information Exploitation for Efficient Wyner-Ziv Video Coding
Wyner-Ziv video coding is a lossy source coding paradigm where the video statistics are exploited, partially or totally at the decoder. The side information represents a noisy ver...
Fernando Pereira, João Ascenso
LCN
2007
IEEE
15 years 11 months ago
Efficient MD Coding Core Selection to Reduce the Bandwidth Consumption
- Multiple distribution trees and multiple description (MD) coding are highly robust since they provide redundancy both in network paths and data. However, MD coded streaming inclu...
Sunoh Choi, Sang-Seon Byun, Chuck Yoo
ACSAC
2000
IEEE
15 years 9 months ago
ITS4: A Static Vulnerability Scanner for C and C++ Code
We describe ITS4, a tool for statically scanning security-critical C source code for vulnerabilities. Compared to other approaches, our scanning technique stakes out a new middle ...
John Viega, J. T. Bloch, Y. Kohno, Gary McGraw