Sciweavers

1953 search results - page 178 / 391
» codes 2010
Sort
View
146
Voted
SRDS
2010
IEEE
15 years 3 months ago
A Study on Latent Vulnerabilities
Abstract-Software code reuse has long been touted as a reliable and efficient software development paradigm. Whilst this practice has numerous benefits, it is inherently susceptibl...
Beng Heng Ng, Xin Hu, Atul Prakash
TWC
2010
14 years 11 months ago
A Novel Graph-Based Suboptimal Multiuser Detector for FDM-CPM Transmissions
We consider a frequency division multiplexed (FDM) system where each user employs a continuous phase modulation (CPM), serially concatenated with an outer code through an interleav...
Amina Piemontese, Giulio Colavolpe
ESORICS
2010
Springer
15 years 6 months ago
On E-Vote Integrity in the Case of Malicious Voter Computers
Norway has started to implement e-voting (over the Internet, and by using voters' own computers) within the next few years. The vulnerability of voter's computers was ide...
Sven Heiberg, Helger Lipmaa, Filip van Laenen
162
Voted
TII
2010
166views Education» more  TII 2010»
14 years 11 months ago
Source-to-Source Architecture Transformation for Performance Optimization in BIP
Behavior, Interaction, Priorities (BIP) is a component framework for constructing systems from a set of atomic components by using two kinds of composition operators: interactions ...
Marius Bozga, Mohamad Jaber, Joseph Sifakis
149
Voted
CISIS
2010
IEEE
15 years 8 months ago
Automatic Offloading of C++ for the Cell BE Processor: A Case Study Using Offload
Offload C++ is an extended version of the C++ language, together with a compiler and runtime system, for automatically offloading general-purpose C++ code to run on the Synergistic...
Alastair F. Donaldson, Uwe Dolinsky, Andrew Richar...