Sciweavers

13987 search results - page 114 / 2798
» The Two Guards Problem
Sort
View
121
Voted
IWPC
2009
IEEE
15 years 10 months ago
Impact analysis and visualization toolkit for static crosscutting in AspectJ
Understanding aspect-oriented systems, without appropriate tool support, is a difficult and a recognized problem in the research community. Surprisingly, little has been done to ...
Dehua Zhang, Ekwa Duala-Ekoko, Laurie J. Hendren
ICASSP
2008
IEEE
15 years 9 months ago
Blind channel shortening in OFDM system using nulltones and cyclic prefix
This paper considers the problem of blind channel shortening in OFDM systems. Standard OFDM systems use guard interval (GI) in form of cyclic prefix (CP) and nulltones (NT) redun...
Taoufik Ben Jabeur, Karim Abed-Meraim, Hatem Bouje...
SP
2008
IEEE
15 years 9 months ago
Preventing Memory Error Exploits with WIT
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious problem despite previous research on techniques to pr...
Periklis Akritidis, Cristian Cadar, Costin Raiciu,...
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
15 years 9 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
AGP
1996
IEEE
15 years 7 months ago
Modular Analysis of Suspension Free cc Programs
Compositional semantics allow to reason about programs in an incremental way, thus providing the formal base for the development of modular data-flow analyses. The major drawback ...
Enea Zaffanella