Sciweavers

206 search results - page 34 / 42
» Code clone detection in practice
Sort
View
IEEEARES
2008
IEEE
14 years 4 months ago
A Lightweight Security Analyzer inside GCC
This paper describes the design and implementation of a lightweight static security analyzer that exploits the compilation process of the gcc compiler. The tool is aimed at giving...
Davide Pozza, Riccardo Sisto
TCSV
2002
148views more  TCSV 2002»
13 years 9 months ago
A full-featured, error-resilient, scalable wavelet video codec based on the set partitioning in hierarchical trees (SPIHT) algor
Compressed video bitstreams require protection from channel errors in a wireless channel. The threedimensional (3-D) SPIHT coder has proved its efficiency and its real-time capabi...
Sungdae Cho, William A. Pearlman
ICSE
2010
IEEE-ACM
14 years 2 months ago
Customized awareness: recommending relevant external change events
It is often assumed that developers’ view of their system and its environment is always consistent with everyone else’s; in practice, this assumption can be false, as the deve...
Reid Holmes, Robert J. Walker
IEEEARES
2009
IEEE
14 years 4 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
JSAC
2008
106views more  JSAC 2008»
13 years 9 months ago
A Low-Complexity Detector for Large MIMO Systems and Multicarrier CDMA Systems
We consider large MIMO systems, where by `large' we mean number of transmit and receive antennas of the order of tens to hundreds. Such large MIMO systems will be of immense i...
K. Vishnu Vardhan, Saif K. Mohammed, Ananthanaraya...