Sciweavers

787 search results - page 39 / 158
» Source code analysis and manipulation
Sort
View
IJACTAICIT
2010
123views more  IJACTAICIT 2010»
14 years 7 months ago
A Hybrid Fault-Proneness Detection Approach Using Text Filtering and Static Code Analysis
We have proposed a fault-prone software module detection method using text-filtering approach, called Fault-proneness filtering. Even though the fault-proneness filtering achieved...
Osamu Mizuno, Hideaki Hata
EJWCN
2010
97views more  EJWCN 2010»
14 years 4 months ago
Analysis and Construction of Full-Diversity Joint Network-LDPC Codes for Cooperative Communications
Abstract--Transmit diversity is necessary in harsh environments to reduce the required transmit power for achieving a given error performance at a certain transmission rate. In net...
Dieter Duyck, Daniele Capirone, Joseph Jean Boutro...
AICCSA
2008
IEEE
266views Hardware» more  AICCSA 2008»
15 years 4 months ago
A novel flow-sensitive type and effect analysis for securing C code
In this paper, we present a novel type and effect analysis for detecting type cast errors and memory errors in C source code. Our approach involves a type system with effect, regi...
Syrine Tlili, Mourad Debbabi
NDSS
2008
IEEE
15 years 4 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
INFOCOM
2007
IEEE
15 years 4 months ago
On the Performance Analysis of Network-Coded Cooperation in Wireless Networks
—In this letter, a network-coded cooperation scheme with dynamic coding mechanism (DC-NCC) is proposed. In DCNCC, the relay dynamically adapts forming the network-coded data base...
Cong Peng, Qian Zhang, Ming Zhao 0001, Yan Yao