Sciweavers

1629 search results - page 194 / 326
» Infeasible Code Detection
Sort
View
SAFECOMP
2007
Springer
15 years 7 months ago
Software Encoded Processing: Building Dependable Systems with Commodity Hardware
In future, the decreasing feature size and the reduced power supply will make it much more difficult to built reliable microprocessors. Economic pressure will most likely result in...
Ute Wappler, Christof Fetzer
COMPSAC
2006
IEEE
15 years 7 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
SIPS
2006
IEEE
15 years 7 months ago
A Robust Band-Tracking Packet Detector (BT-PD) in OFDM-Based Ultra-Wideband Systems
Multiband orthogonal frequency-division multiplexing (MB-OFDM) systems employ frequencyhopping technology to achieve the capabilities of multiple access and frequency diversity. H...
Jyh-Ting Lai, Chun-Yuan Chu, An-Yeu Wu, Wen-Chiang...
VTC
2006
IEEE
124views Communications» more  VTC 2006»
15 years 7 months ago
Iterative Partial-Cancelling MMSE Algorithms for W-CDMA MIMO-BLAST Systems
—This paper focuses on the usage of an enhanced equalization-based receiver for WCDMA (Wideband CodeDivision Multiple Access) MIMO (Multiple Input, Multiple Output) BLAST (Bell L...
João Carlos Silva, Rui Dinis, Nuno Souto, F...
WCRE
2006
IEEE
15 years 7 months ago
How Programs Represent Reality (and how they don't)
Programming is modeling the reality. Most of the times, the mapping between source code and the real world concepts is captured implicitly in the names of identifiers. Making the...
Daniel Ratiu, Florian Deissenboeck