Sciweavers

1629 search results - page 234 / 326
» Infeasible Code Detection
Sort
View
ESSOS
2010
Springer
15 years 10 months ago
Formally-Based Black-Box Monitoring of Security Protocols
In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that sto...
Alfredo Pironti, Jan Jürjens
COMPSAC
2009
IEEE
15 years 8 months ago
An Integrated Framework for Checking Concurrency-Related Programming Errors
Developing concurrent programs is intrinsically difficult. They are subject to programming errors that are not present in traditional sequential programs. Our current work is to ...
Qichang Chen, Liqiang Wang
ISORC
2009
IEEE
15 years 8 months ago
Marte CCSL to Execute East-ADL Timing Requirements
In the automotive domain, several loosely-coupled Architecture Description Languages (ADLs) compete to proet of abstract modeling and analysis services on top of the implementatio...
Frédéric Mallet, Marie-Agnès ...
IWCMC
2009
ACM
15 years 8 months ago
A cognitive radio system for home theatre "5+1 audio" surround applications
This paper presents the application of cognitive algorithm for a stream diffusion in home theatre “5+1 audio” surround applications. We develop a wavelet-based method to effic...
Valeria Orani, Vlad Popescu, Maurizio Murroni
GLOBECOM
2008
IEEE
15 years 8 months ago
Performance of Constrained Blind Adaptive DS-CDMA UWB Multiuser Detector in Multipath Channel with Narrowband Interference
—In this paper we derive and propose constrained blind DS-CDMA UWB multiuser detection algorithm to suppress the multi access interference (MAI) in multipath channels, and studie...
Gangadhar S. Biradar, Shabbir N. Merchant, Uday B....