Sciweavers

1629 search results - page 26 / 326
» Infeasible Code Detection
Sort
View
TCOM
2008
153views more  TCOM 2008»
13 years 10 months ago
Blind estimation and detection of space-time trellis coded transmissions over the Rayleigh fading MIMO channel
We present a joint channel estimation and detection method of space-time trellis codes (STTC) in the context of an unknown flat fading multiple-input multiple-output (MIMO) channel...
Frédéric Lehmann
C3S2E
2008
ACM
14 years 3 days ago
Towards a mutation-based automatic framework for evaluating code clone detection tools
In the last decade, a great many code clone detection tools have been proposed. Such a large number of tools calls for a quantitative comparison, and there have been several attem...
Chanchal Kumar Roy, James R. Cordy
APSEC
2005
IEEE
14 years 2 days ago
Increasing the Efficiency of Fault Detection in Modified Code
Many software systems are developed in a number of consecutive releases. Each new release does not only add new code but also modifies already existing one. In this study we have ...
Piotr Tomaszewski, Lars Lundberg, Håkan Grah...
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 7 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
14 years 3 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna