Sciweavers

1991 search results - page 197 / 399
» Using a Coding Standard to Improve Program Quality
Sort
View
118
Voted
SCAM
2006
IEEE
15 years 8 months ago
Normalizing Metamorphic Malware Using Term Rewriting
Metamorphic malware — including certain viruses and worms — rewrite their code during propagation. This paper presents a method for normalizing multiple variants of metamorphi...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
JAVA
1999
Springer
15 years 6 months ago
Design, Implementation, and Evaluation of Optimizations in a Just-in-Time Compiler
The Java language incurs a runtime overhead for exception checks and object accesses without an interior pointer in order to ensure safety. It also requires type inclusion test, d...
Kazuaki Ishizaki, Motohiro Kawahito, Toshiaki Yasu...
119
Voted
ISCAS
1999
IEEE
124views Hardware» more  ISCAS 1999»
15 years 6 months ago
On the robustness of vector set partitioning image coders to bit errors
A vector enhancement of Said and Pearlman's Set Partitioning in Hierarchical Trees (SPIHT) methodology, named VSPIHT, has recently been proposed for embedded wavelet image co...
D. Mukherjee, S. K. Mitra
111
Voted
IADIS
2003
15 years 4 months ago
ECC Video with Intra Frame Relay
A new error resilient video coding tool [4] has been proposed, which further encodes with ECC (Error Correction Code) a video bitstream. Simulation results show a significant impr...
Bing Du, Anthony J. Maeder, Miles Moody
CODES
2005
IEEE
15 years 8 months ago
SOMA: a tool for synthesizing and optimizing memory accesses in ASICs
Arbitrary memory dependencies and variable latency memory systems are major obstacles to the synthesis of large-scale ASIC systems in high-level synthesis. This paper presents SOM...
Girish Venkataramani, Tiberiu Chelcea, Seth Copen ...