Sciweavers

1953 search results - page 47 / 391
» codes 2010
Sort
View
IH
2010
Springer
14 years 7 months ago
Short Collusion-Secure Fingerprint Codes against Three Pirates
In this article, we propose a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates and give a theoretical security evaluation. Our pira...
Koji Nuida
PEPM
2010
ACM
15 years 6 months ago
Clone detection and elimination for Haskell
Duplicated code is a well known problem in software maintenance and refactoring. Code clones tend to increase program size and several studies have shown that duplicated code make...
Christopher Brown, Simon Thompson
MEMICS
2010
14 years 4 months ago
Test-Case Generation for Embedded Binary Code Using Abstract Interpretation
interpretation example conclusion Test-Case Generation for Embedded Binary ng Abstract Interpretation Thomas Reinbacher1 , J
Thomas Reinbacher, Jörg Brauer, Martin Horaue...
TIT
2010
90views Education» more  TIT 2010»
14 years 4 months ago
Correcting limited-magnitude errors in the rank-modulation scheme
We study error-correcting codes for permutations under the infinity norm, motivated the rank-modulation scheme for flash memories. In this scheme, a set of n flash cells are combin...
Itzhak Tamo, Moshe Schwartz
IAJIT
2010
193views more  IAJIT 2010»
14 years 8 months ago
Performance of OCDMA Systems Using Random Diagonal Code for Different Decoders Architecture Schemes
: In this paper, new code families are constructed for spectral-amplitude coding optical code division multiple access, called random diagonal code for spectral amplitude coding op...
Hilal Adnan Fadhil, Syed Alwee Aljunid, Badlished ...