Sciweavers

1629 search results - page 72 / 326
» Infeasible Code Detection
Sort
View
VTC
2010
IEEE
145views Communications» more  VTC 2010»
14 years 8 months ago
Ant-Colony Based Near-ML Space-Time Multiuser Detection for the STBC Assisted DS-CDMA Uplink
— In this contribution, a novel Ant Colony Optimization (ACO) based Space-Time (ST) Multiuser Detection (MUD) algorithm was proposed in order to improve the Bit Error Ratio (BER)...
Chong Xu, Lie-Liang Yang, Lajos Hanzo
ACSAC
2002
IEEE
15 years 2 months ago
A Toolkit for Detecting and Analyzing Malicious Software
In this paper we present PEAT: The Portable Executable Analysis Toolkit. It is a software prototype designed to provide a selection of tools that an analyst may use in order to ex...
Michael Weber, Matthew Schmid, Michael Schatz, Dav...
IH
2005
Springer
15 years 3 months ago
Self-validating Branch-Based Software Watermarking
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, ...
Ginger Myles, Hongxia Jin
ESEM
2009
ACM
15 years 4 months ago
The evolution and impact of code smells: A case study of two open source systems
Code smells are design flaws in object-oriented designs that may lead to maintainability issues in the further evolution of the software system. This study focuses on the evolutio...
Steffen Olbrich, Daniela Cruzes, Victor R. Basili,...
GLOBECOM
2006
IEEE
15 years 3 months ago
Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations
Abstract— In this paper, we investigate the application of nonbinary low density parity check (LDPC) codes over Galois field GF(q) for both single-input single-output (SISO) and...
Ronghui Peng, Rong-Rong Chen