Sciweavers

1629 search results - page 107 / 326
» Infeasible Code Detection
Sort
View
PDPTA
2004
14 years 11 months ago
Verification of Parity Data in Large Scale Storage Systems
Highly available storage uses replication and other redundant storage to recover from a component failure. If parity data calculated from an erasure correcting code is not updated...
Thomas J. E. Schwarz
VTC
2006
IEEE
15 years 3 months ago
An Iterative Detection Technique for DS-CDMA Signals with Strong Nonlinear Distortion Effects
Abstract - Whenever a DS-CDMA signal (Direct Sequence Code Division Multiple Access) is the sum of several components associated to different spreading codes (e.g., the DS-CDMA sig...
Rui Dinis, Paulo Silva
CAV
2011
Springer
253views Hardware» more  CAV 2011»
14 years 1 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
GECCO
2005
Springer
108views Optimization» more  GECCO 2005»
15 years 3 months ago
Hybridizing evolutionary algorithms and clustering algorithms to find source-code clones
This paper presents a hybrid approach to detect source-code clones that combines evolutionary algorithms and clustering. A case-study is conducted on a small C++ code base. The pr...
Andrew Sutton, Huzefa H. Kagdi, Jonathan I. Maleti...
VTS
2003
IEEE
104views Hardware» more  VTS 2003»
15 years 3 months ago
Application of Saluja-Karpovsky Compactors to Test Responses with Many Unknowns
This paper addresses the problem of compacting test responses in the presence of unknowns at the input of the compactor by exploiting the capabilities of well-known error detectio...
Janak H. Patel, Steven S. Lumetta, Sudhakar M. Red...