Sciweavers

1629 search results - page 124 / 326
» Infeasible Code Detection
Sort
View
C3S2E
2008
ACM
14 years 12 months ago
Context-sensitive cut, copy, and paste
Creating and editing source code are tedious and error-prone processes. One important source of errors in editing programs is the failure to correctly adapt a block of copied code...
Reid Kerr, Wolfgang Stürzlinger
SETA
2004
Springer
93views Mathematics» more  SETA 2004»
15 years 3 months ago
Spectral Orbits and Peak-to-Average Power Ratio of Boolean Functions with Respect to the {I, H, N}n Transform
We enumerate the inequivalent self-dual additive codes over GF(4) of blocklength n, thereby extending the sequence A090899 in The On-Line Encyclopedia of Integer Sequences from n =...
Lars Eirik Danielsen, Matthew G. Parker
ICMCS
2006
IEEE
85views Multimedia» more  ICMCS 2006»
15 years 4 months ago
Prefilter Control Scheme for Low bitrate TV Distribution
In IP-based TV distribution, coding degradation is sometimes evident in critical scenes because the bit rate for compression is rather low. Prefiltering is an effective counterme...
Ryoichi Kawada, Atsushi Koike, Yasuyuki Nakajima
IJBRA
2006
61views more  IJBRA 2006»
14 years 10 months ago
Finding functional promoter motifs by computational methods: a word of caution
: The standard practice in the analysis of promoters is to select promoter regions of convenient length. This may lead to false results when searching for Transcription Factor Bind...
Rajesh Chowdhary, Limsoon Wong, Vladimir B. Bajic
CJ
2004
93views more  CJ 2004»
14 years 9 months ago
An Architecture for Kernel-Level Verification of Executables at Run Time
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
Luigi Catuogno, Ivan Visconti