Sciweavers

1953 search results - page 38 / 391
» codes 2010
Sort
View
CORR
2010
Springer
55views Education» more  CORR 2010»
14 years 8 months ago
Infinite Families of Optimal Splitting Authentication Codes Secure Against Spoofing Attacks of Higher Order
We consider the problem of constructing optimal authentication codes with splitting. New infinite families of such codes are obtained. In particular, we establish the first known...
Yeow Meng Chee, Xiande Zhang, Hui Zhang
ICSE
2010
IEEE-ACM
15 years 2 months ago
Improved social trustability of code search results
Search is a fundamental activity in software development. However, to search source code efficiently, it is not sufficient to implement a traditional full text search over a base ...
Florian S. Gysin
ENTCS
2006
127views more  ENTCS 2006»
14 years 9 months ago
Component Identification Through Program Slicing
This paper reports on the development of specific slicing techniques for functional programs and their use for the identification of possible coherent components from monolithic c...
Nuno F. Rodrigues, Luís Soares Barbosa
INFOCOM
2010
IEEE
14 years 7 months ago
Dynamic Control of Coding in Delay Tolerant Networks
Abstract--We study replication mechanisms that include ReedSolomon type codes as well as network coding in order to improve the probability of successful delivery within a given ti...
Eitan Altman, Francesco De Pellegrini, Lucile Sass...
TIT
2010
103views Education» more  TIT 2010»
14 years 4 months ago
Fast optimal decoding of multiplexed orthogonal designs by conditional optimization
This paper focuses on conditional optimization as a decoding primitive for high rate space
Songsri Sirianunpiboon, Yiyue Wu, A. Robert Calder...