Sciweavers

1579 search results - page 134 / 316
» On the Constructions of Constant-Weight Codes
Sort
View
SEW
2007
IEEE
15 years 4 months ago
A Generative Approach to Building a Framework for Hard Real-Time Applications
The communication and tasking infrastructure of a realtime application makes up a significant portion of any embedded control system. Traditionally, the tasking and communication...
Irfan Hamid, Elie Najm, Jérôme Hugues
CCS
2008
ACM
14 years 12 months ago
Traitor tracing with constant size ciphertext
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create the box. We present a traitor tracing system where ciphertex...
Dan Boneh, Moni Naor
FASE
2008
Springer
14 years 11 months ago
Software Quality Improvement Via Pattern Matching
Abstract. Nested if-then-else statements is the most common programming schema in applications like data transformation or data analysis. In most cases, these can be replaced by hi...
Radu Kopetz, Pierre-Etienne Moreau
PEPM
2009
ACM
15 years 6 months ago
Designing aspects for side-effect localization
Computation performed in many typical aspects involve side effects. In a purely functional setting, adding such aspects using techniques such as monadification will generally lea...
Kung Chen, Jia-Yin Lin, Shu-Chun Weng, Siau-Cheng ...
ACSC
2007
IEEE
15 years 4 months ago
Dynamic Measurement of Polymorphism
Measuring "reuse" and "reusability" is difficult because there are so many different facets to these concepts. Before we can effectively measure reuse and reus...
Kelvin Choi, Ewan D. Tempero