Sciweavers

1448 search results - page 22 / 290
» From Requirements to Code Revisited
Sort
View
SAFECOMP
2010
Springer
13 years 6 months ago
Deriving Safety Cases for Hierarchical Structure in Model-Based Development
Abstract. Model-based development and automated code generation are increasingly used for actual production code, in particular in mathematical and engineering domains. However, si...
Nurlida Basir, Ewen Denney, Bernd Fischer 0002
IWPC
2006
IEEE
14 years 1 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere
GLOBECOM
2009
IEEE
13 years 5 months ago
Cooperative Uplink of Two Mobile Stations with Network Coding Based on the WiMax LDPC Code
We consider the uplink of two mobile stations with the help of one common relay. Recently, joint network-channel coding based on LDPC codes was proposed for this setup where the ch...
Lena Chebli, Christoph Hausl, Georg Zeitler, Ralf ...
SAC
2008
ACM
13 years 7 months ago
Optimizing code through iterative specialization
Code specialization is a way to obtain significant improvement in the performance of an application. It works by exposing values of different parameters in source code. The availa...
Minhaj Ahmad Khan, Henri-Pierre Charles, Denis Bar...
GLOBECOM
2010
IEEE
13 years 5 months ago
An Exit-Chart Aided Design Procedure for Near-Capacity N-Component Parallel Concatenated Codes
1 Shannon's channel capacity specifies the upper bound on the amount of bits per channel use. In this paper, we explicitly demonstrate that twin-component turbo codes suffer f...
Hong Chen, Robert G. Maunder, Lajos Hanzo