Sciweavers

787 search results - page 54 / 158
» Source code analysis and manipulation
Sort
View
ICC
2009
IEEE
119views Communications» more  ICC 2009»
15 years 4 months ago
Distributed Turbo Trellis Coded Modulation for Cooperative Communications
— In this contribution, we propose a Distributed Turbo Trellis Coded Modulation (DTTCM) scheme for cooperative communications. The DTTCM scheme is designed based on its decoding ...
Soon Xin Ng, Yonghui Li, Lajos Hanzo
COCO
2007
Springer
96views Algorithms» more  COCO 2007»
15 years 3 months ago
Unbalanced Expanders and Randomness Extractors from Parvaresh-Vardy Codes
We give an improved explicit construction of highly unbalanced bipartite expander graphs with expansion arbitrarily close to the degree (which is polylogarithmic in the number of ...
Venkatesan Guruswami, Christopher Umans, Salil P. ...
ICSE
2012
IEEE-ACM
13 years 3 days ago
Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE
—As smartphones become popular, manufacturers such as Samsung Electronics are developing smartphones with rich functionality such as a camera and photo editing quickly, which acc...
Yunho Kim, Moonzoo Kim, Young Joo Kim, Yoonkyu Jan...
OOPSLA
2007
Springer
15 years 3 months ago
The JastAdd extensible Java compiler
We have implemented intraprocedural control-flow and data-flow analysis of Java source code in a declarative manner, using reference attribute grammars augmented with circular a...
Torbjörn Ekman, Görel Hedin
ITCC
2005
IEEE
15 years 3 months ago
ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives
Hash algorithms are a class of cryptographic primitives used for fulfilling the requirements of integrity and authentication in cryptography. In this paper, we propose and present...
T. S. Ganesh, T. S. B. Sudarshan