Sciweavers

4764 search results - page 164 / 953
» Applications of Error-Control Coding
Sort
View
APSEC
2002
IEEE
14 years 1 months ago
Design of Rules for Transforming UML Sequence Diagrams into Java code
UML is a modeling language that most developers employed during design phase. UML provides various types of diagrams used for specifying both the structure and the behavior of sys...
Mathupayas Thongmak, Pornsiri Muenchaisri
IWPC
1998
IEEE
14 years 11 days ago
Archetypal Source Code Searches: A Survey of Software Developers and Maintainers
In this study, we conducted a survey to generate archetypes of source code searching by programmers across maintenance tasks. Using a questionnaire on a web page, we obtained 69 r...
Susan Elliott Sim, Charles L. A. Clarke, Richard C...
PST
2004
13 years 9 months ago
Detection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...
JSA
2007
89views more  JSA 2007»
13 years 8 months ago
Robust codes and robust, fault-tolerant architectures of the Advanced Encryption Standard
— Hardware implementations of cryptographic algorithms are vulnerable to fault analysis attacks. Methods based on traditional fault-tolerant architectures are not suited for prot...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
DCC
2000
IEEE
14 years 16 days ago
Multi-Resolution Adaptation of the SPIHT Algorithm for Multiple Description
Multiple description codes are data compression algorithms designed with the goal of minimizing the distortion caused by data loss in packet-based or diversity communications syst...
Nedeljko Varnica, Michael Fleming, Michelle Effros