Sciweavers

1629 search results - page 236 / 326
» Infeasible Code Detection
Sort
View
SCAM
2007
IEEE
15 years 7 months ago
Toward an Implementation of the "Form Template Method" Refactoring
This paper presents an implementation of the “form template method” refactoring. This transformation has not been automated yet, but has many similarities with other transform...
Nicolas Juillerat, Béat Hirsbrunner
VTC
2007
IEEE
152views Communications» more  VTC 2007»
15 years 7 months ago
Iterative (TURBO) IQ Imbalance Estimation and Correction in BICM-ID for Flat Fading Channels
—TURBO principle has been exploited gainfully to implement many receiver functions. RF front-end impairments are a serious issue in high spectral efficient applications. IQ imba...
Raghunath Cherukuri, Poras T. Balsara
ETS
2006
IEEE
119views Hardware» more  ETS 2006»
15 years 7 months ago
On-Chip Test Generation Using Linear Subspaces
A central problem in built-in self test (BIST) is how to efficiently generate a small set of test vectors that detect all targeted faults. We propose a novel solution that uses l...
Ramashis Das, Igor L. Markov, John P. Hayes
AOSD
2006
ACM
15 years 7 months ago
Reusable aspect-oriented implementations of concurrency patterns and mechanisms
In this paper, we present a collection of well-known high-level concurrency patterns and mechanisms, coded in AspectJ. We discuss benefits of these implementations relative to pla...
Carlos A. Cunha, João Luís Sobral, M...
ICDAR
2005
IEEE
15 years 7 months ago
Image Analysis for Efficient Categorization of Image-based Spam E-mail
To circumvent prevalent text-based anti-spam filters, spammers have begun embedding the advertisement text in images. Analogously, proprietary information (such as source code) ma...
Hrishikesh Aradhye, Gregory K. Myers, James A. Her...