Sciweavers

5962 search results - page 169 / 1193
» Working with Patterns and Code
Sort
View
136
Voted
ISCAS
2008
IEEE
155views Hardware» more  ISCAS 2008»
15 years 10 months ago
Advanced colluder detection techniques for OSIFT-based hiding codes
— In this work, we examine a family of anti-collusion codes using the principle of “Orthogonal Spreading followed by the Inverse Fourier Transform (OSIFT)” as introduced in [...
Byung-Ho Cha, C. C. Jay Kuo
108
Voted
SCAM
2008
IEEE
15 years 10 months ago
Some Assembly Required - Program Analysis of Embedded System Code
Programming embedded system software typically involves more than one programming language. Normally, a high-level language such as C/C++ is used for application oriented tasks an...
Ansgar Fehnker, Ralf Huuck, Felix Rauch, Sean Seef...
115
Voted
SCAM
2008
IEEE
15 years 10 months ago
From Indentation Shapes to Code Structures
In a previous study, we showed that indentation was regular across multiple languages and the variance in the level of indentation of a block of revised code is correlated with me...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
105
Voted
SECON
2008
IEEE
15 years 10 months ago
Practical Localized Network Coding in Wireless Mesh Networks
—In this paper, BFLY–a practical localized network coding protocol for wireless mesh networks–is proposed. To supplement forwarding packets in classical networks, intermediat...
Oluwasoji Omiwade, Rong Zheng, Cunqing Hua
121
Voted
INFOCOM
2002
IEEE
15 years 8 months ago
Beyond Routing: An Algebraic Approach to Network Coding
Abstract— In this paper we consider the issue of network capacity. The recent work by Li and Yeung examined the network capacity of multicast networks and related capacity to cut...
Muriel Médard, Ralf Koetter