Sciweavers

2957 search results - page 532 / 592
» Code analysis and CS-XML
Sort
View
CN
2006
117views more  CN 2006»
13 years 8 months ago
Error resilient image transport in wireless sensor networks
In this paper, we propose an "in-network" diversity combining scheme for image transport over wireless sensor networks. We consider a wireless sensor network with both w...
Huaming Wu, Alhussein A. Abouzeid
CORR
2006
Springer
116views Education» more  CORR 2006»
13 years 8 months ago
On the Fading Paper Achievable Region of the Fading MIMO Broadcast Channel
We consider transmission over the ergodic fading multiple-antenna broadcast (MIMO-BC) channel with partial channel state information at the transmitter and full information at the ...
Amir Bennatan, David Burshtein
CORR
2006
Springer
138views Education» more  CORR 2006»
13 years 8 months ago
Applying and Combining Three Different Aspect Mining Techniques
Abstract. Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these conce...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...
IJMMS
2008
90views more  IJMMS 2008»
13 years 8 months ago
Pair programming and the mysterious role of the navigator
Computer programming is generally understood to be highly challenging and since its inception a wide range of approaches, tools and methodologies have been developed to assist in ...
Sallyann Bryant, Pablo Romero, Benedict du Boulay
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 8 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald