Sciweavers

1579 search results - page 104 / 316
» On the Constructions of Constant-Weight Codes
Sort
View
RAID
2001
Springer
15 years 2 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
GECCO
2008
Springer
116views Optimization» more  GECCO 2008»
14 years 11 months ago
Evolving similarity functions for code plagiarism detection
Students are often asked to submit electronic copies of their program code as part of assessment in computer science courses. To counter code plagiarism, educational institutions ...
Victor Ciesielski, Nelson Wu, Seyed M. M. Tahaghog...
CORR
2008
Springer
92views Education» more  CORR 2008»
14 years 10 months ago
Differential Transmit Diversity Based on Quasi-Orthogonal Space-Time Block Code
By using joint modulation and customized constellation set, we show that Quasi-Orthogonal Space-Time Block Code (QO-STBC) can be used to form a new differential space-time modulati...
Chau Yuen, Yong Liang Guan, Tjeng Thiang Tjhung
TSE
2010
140views more  TSE 2010»
14 years 8 months ago
Learning a Metric for Code Readability
—In this paper, we explore the concept of code readability and investigate its relation to software quality. With data collected from 120 human annotators, we derive associations...
Raymond P. L. Buse, Westley Weimer
SISW
2005
IEEE
15 years 3 months ago
Lazy Revocation in Cryptographic File Systems
A crucial element of distributed cryptographic file systems are key management solutions that allow for flexible but secure data sharing. We consider efficient key management s...
Michael Backes, Christian Cachin, Alina Oprea