Sciweavers

1629 search results - page 21 / 326
» Infeasible Code Detection
Sort
View
WCNC
2008
IEEE
14 years 4 months ago
Two-Stage Code Acquisition Employing Search Space Reduction and Iterative Detection in the DS-UWB Downlink
— In this paper we propose and investigate an iterative code acquisition scheme assisted by both search space reduction and iterative Massage Passing (MP), which was designed for...
Seung Hwan Won, Lajos Hanzo
CORR
2008
Springer
137views Education» more  CORR 2008»
13 years 10 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...
TWC
2008
209views more  TWC 2008»
13 years 10 months ago
Application of Nonbinary LDPC Cycle Codes to MIMO Channels
In this paper, we investigate the application of nonbinary low-density parity-check (LDPC) cycle codes over Galois field GF(q) to multiple-input multiple-output (MIMO) channels. Tw...
Ronghui Peng, Rong-Rong Chen
IWPC
2003
IEEE
14 years 3 months ago
Towards a Clone Detection Benchmark Suite and Results Archive
Source code clones are copies or near-copies of other portions of code, often created by copying and pasting portions of source code. This working session is concerned with buildi...
Arun Lakhotia, Junwei Li, Andrew Walenstein, Yun Y...
DFT
1999
IEEE
139views VLSI» more  DFT 1999»
14 years 2 months ago
Soft-Error Detection through Software Fault-Tolerance Techniques
The paper describes a systematic approach for automatically introducing data and code redundancy into an existing program written using a high-level language. The transformations ...
Maurizio Rebaudengo, Matteo Sonza Reorda, Marco To...