Sciweavers

787 search results - page 9 / 158
» Source code analysis and manipulation
Sort
View
IEEESP
2006
54views more  IEEESP 2006»
14 years 9 months ago
Putting the tools to work: how to succeed with source code analysis
Pravir Chandra, Brian Chess, John Steven
CSMR
2007
IEEE
15 years 4 months ago
Using The Meta-Environment for Maintenance and Renovation
The Meta-Environment is a flexible framework for language development, source code analysis and source code transformation. We highlight new features and demonstrate how the syst...
M. G. J. van den Brand, Magiel Bruntink, G. R. Eco...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 3 months ago
On Bit Error Robustness of Trellis Source Codes
— Trellis codes based on linear congruential recursions have recently been introduced as powerful source codes. For a modest computational complexity they offer excellent rate di...
Tomas Eriksson, Norbert Goertz
EUROCRYPT
2008
Springer
14 years 11 months ago
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Consider an abstract storage device (G) that can hold a single element x from a fixed, publicly known finite group G. Storage is private in the sense that an adversary does not hav...
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles ...