Sciweavers

1629 search results - page 14 / 326
» Infeasible Code Detection
Sort
View
ICAI
2008
15 years 6 months ago
Mapping of Activity Recognition as a Distributed Inference Problem in Sensor Network
- This paper presents a distributed model for detecting Activities of Daily Living (ADLs) in a home setting. We consider an environment where household devices and utensils are aug...
Md. Kamrul Hasan, Husne Ara Rubaiyeat, Young-Koo L...
135
Voted
ICSM
2009
IEEE
15 years 11 months ago
Scalable and incremental clone detection for evolving software
Code clone management has been shown to have several benefits for software developers. When source code evolves, clone management requires a mechanism to efficiently and increme...
Tung Thanh Nguyen, Hoan Anh Nguyen, Jafar M. Al-Ko...
GLOBECOM
2008
IEEE
15 years 11 months ago
Impact of Signaling Schemes on Iterative Linear Minimum-Mean-Square-Error Detection
—In this paper, we study the iterative detection problem for a coded system with multi-ary modulation. We show that, with iterative linear minimum-mean-square-error (LMMSE) detec...
Li Ping, Jun Tong, Xiaojun Yuan, Qinghua Guo
TIT
2008
119views more  TIT 2008»
15 years 4 months ago
Bit-Level Equalization and Soft Detection for Gray-Coded Multilevel Modulation
This paper investigates iterative soft-in soft-out (SISO) detection in coded multiple access channels, with Gray-coded M-ary quadrature amplitude modulation (QAM) for the channel ...
Darryl Dexu Lin, Teng Joon Lim
PST
2004
15 years 5 months ago
Detection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...