Sciweavers

436 search results - page 29 / 88
» On two variations of identifying codes
Sort
View
DFT
2007
IEEE
135views VLSI» more  DFT 2007»
15 years 4 months ago
Fault Secure Encoder and Decoder for Memory Applications
We introduce a reliable memory system that can tolerate multiple transient errors in the memory words as well as transient errors in the encoder and decoder (corrector) circuitry....
Helia Naeimi, André DeHon
KBSE
2007
IEEE
15 years 4 months ago
A dynamic birthmark for java
Code theft is a threat for companies that consider code as a core asset. A birthmark can help them to prove code theft by identifying intrinsic properties of a program. Two progra...
David Schuler, Valentin Dallmeier, Christian Lindi...
IJNM
2000
91views more  IJNM 2000»
14 years 9 months ago
Coding-based schemes for fault identification in communication networks
The complexity of communication networks and the amount of information transferred in these networks have made the management of such networks increasingly difficult. Since faults ...
Chi-Chun Lo, Shing Hong Chen, Bon-Yeh Lin
SIGSOFT
2007
ACM
15 years 10 months ago
Determining detailed structural correspondence for generalization tasks
Generalization tasks are important for continual improvement to the design of an evolving code base, eliminating redundancy where it has accumulated. An important step in generali...
Jörg Denzinger, Joseph J. C. Chang, Robert J....
ICST
2009
IEEE
15 years 4 months ago
The Effectiveness of Automated Static Analysis Tools for Fault Detection and Refactoring Prediction
Many automated static analysis (ASA) tools have been developed in recent years for detecting software anomalies. The aim of these tools is to help developers to eliminate software...
Fadi Wedyan, Dalal Alrmuny, James M. Bieman