Sciweavers

1629 search results - page 14 / 326
» Infeasible Code Detection
Sort
View
ICAI
2008
13 years 11 months ago
Mapping of Activity Recognition as a Distributed Inference Problem in Sensor Network
- This paper presents a distributed model for detecting Activities of Daily Living (ADLs) in a home setting. We consider an environment where household devices and utensils are aug...
Md. Kamrul Hasan, Husne Ara Rubaiyeat, Young-Koo L...
ICSM
2009
IEEE
14 years 4 months ago
Scalable and incremental clone detection for evolving software
Code clone management has been shown to have several benefits for software developers. When source code evolves, clone management requires a mechanism to efficiently and increme...
Tung Thanh Nguyen, Hoan Anh Nguyen, Jafar M. Al-Ko...
GLOBECOM
2008
IEEE
14 years 4 months ago
Impact of Signaling Schemes on Iterative Linear Minimum-Mean-Square-Error Detection
—In this paper, we study the iterative detection problem for a coded system with multi-ary modulation. We show that, with iterative linear minimum-mean-square-error (LMMSE) detec...
Li Ping, Jun Tong, Xiaojun Yuan, Qinghua Guo
TIT
2008
119views more  TIT 2008»
13 years 10 months ago
Bit-Level Equalization and Soft Detection for Gray-Coded Multilevel Modulation
This paper investigates iterative soft-in soft-out (SISO) detection in coded multiple access channels, with Gray-coded M-ary quadrature amplitude modulation (QAM) for the channel ...
Darryl Dexu Lin, Teng Joon Lim
PST
2004
13 years 11 months ago
Detection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...