Sciweavers

3107 search results - page 245 / 622
» Error-Correcting Source Code
Sort
View
SCAM
2005
IEEE
15 years 10 months ago
Transforming Embedded Java Code into Custom Tags
When a new technology is introduced, the migration of existing applications to the new technology must be carefully considered. Automation can make some migrations feasible that o...
Shannon Xu, Thomas R. Dean
WORDS
2003
IEEE
15 years 10 months ago
Timing Analysis of Optimised Code
Timing analysis is a crucial test for dependable hard real-time systems (DHRTS). The calculation of the worst-case execution time (WCET) is mandatory. As modern compilers are capa...
Raimund Kirner, Peter P. Puschner
ICSE
2009
IEEE-ACM
15 years 9 months ago
Predicting faults using the complexity of code changes
Predicting the incidence of faults in code has been commonly associated with measuring complexity. In this paper, we propose complexity metrics that are based on the code change p...
Ahmed E. Hassan
PKC
2010
Springer
179views Cryptology» more  PKC 2010»
15 years 8 months ago
Preventing Pollution Attacks in Multi-source Network Coding
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipi...
Shweta Agrawal, Dan Boneh, Xavier Boyen, David Man...
TIT
2008
106views more  TIT 2008»
15 years 4 months ago
Byzantine Modification Detection in Multicast Networks With Random Network Coding
This paper gives an information theoretic approach for detecting Byzantine modifications in networks employing random linear network coding. Each exogenous source packet is augmen...
Tracey Ho, Ben Leong, Ralf Koetter, Muriel M&eacut...