Sciweavers

1448 search results - page 53 / 290
» From Requirements to Code Revisited
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski
CORR
2007
Springer
149views Education» more  CORR 2007»
13 years 7 months ago
Graph Entropy, Network Coding and Guessing games
We introduce the (private) entropy of a directed graph (in a new network coding sense) as well as a number of related concepts. We show that the entropy of a directed graph is ide...
Søren Riis
ICSE
2009
IEEE-ACM
14 years 10 days ago
A-SCORE: Automatic software component recommendation using coding context
Reusing software components (e.g. classes or modules) improves software quality and developer’s productivity. Unfortunately, developers may miss many reusing opportunities since...
Ryuji Shimada, Yasuhiro Hayase, Makoto Ichii, Mako...
CORR
2011
Springer
199views Education» more  CORR 2011»
12 years 11 months ago
STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs
Relay-assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme. Compared with single relay base...
Pei Liu, Chun Nie, Thanasis Korakis, Elza Erkip, S...
ICIP
2005
IEEE
14 years 9 months ago
Extended direct mode for hierarchical B picture coding
In 3D subband coding, Motion-Compensated Temporal Filtering (MCTF) technique, especially with the adaptive 5/3 wavelet kernel, efficiently exploits the temporal correlation among n...
Jiali Zheng, Xiangyang Ji, Guangnan Ni, Wen Gao, F...