Sciweavers

1629 search results - page 89 / 326
» Infeasible Code Detection
Sort
View
CEEMAS
2007
Springer
15 years 4 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...
AINA
2004
IEEE
15 years 1 months ago
Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus
The aim of this work is to describe a tool (Spi2Java) that automatically generates Java code implementing cryptographic protocols described in the formal specification language sp...
Davide Pozza, Riccardo Sisto, Luca Durante
DSN
2004
IEEE
15 years 1 months ago
Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded Networks
Cyclic Redundancy Codes (CRCs) provide a first line of defense against data corruption in many networks. Unfortunately, many commonly used CRC polynomials provide significantly le...
Philip Koopman, Tridib Chakravarty
CORR
2010
Springer
122views Education» more  CORR 2010»
14 years 10 months ago
Optimum Power and Rate Allocation for Coded V-BLAST: Average Optimization
An analytical framework for performance analysis and optimization of coded V-BLAST is developed. Average power and/or rate allocations to minimize the outage probability as well as...
Victoria Kostina, Sergey Loyka
VLSISP
2002
83views more  VLSISP 2002»
14 years 9 months ago
Modulation and Coding for Noncoherent Communications
Until recently, the theory of noncoherent communications was premised on the use of orthogonal multi-pulse modulation such as frequency shift keying. The main drawback of this modu...
Michael L. McCloud, Mahesh K. Varanasi