Sciweavers

1629 search results - page 284 / 326
» Infeasible Code Detection
Sort
View
CORR
2006
Springer
138views Education» more  CORR 2006»
13 years 9 months ago
Applying and Combining Three Different Aspect Mining Techniques
Abstract. Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these conce...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...
IJFCS
2008
49views more  IJFCS 2008»
13 years 9 months ago
A Markovian Approach for the Analysis of the gene Structure
Hidden Markov models (HMMs) are effective tools to detect series of statistically homogeneous structures, but they are not well suited to analyse complex structures. Numerous meth...
Christelle Melo de Lima, Laurent Gueguen, Christia...
JSAC
2008
136views more  JSAC 2008»
13 years 9 months ago
Relay-Assisted Decorrelating Multiuser Detector (RAD-MUD) for Cooperative CDMA Networks
Abstract-- In this paper, we examine the uplink of a cooperative CDMA network, where users cooperate by relaying each other's messages to the base station. When spreading wave...
Wan-Jen Huang, Yao-Win Peter Hong, C. C. Jay Kuo
JSAC
2006
94views more  JSAC 2006»
13 years 9 months ago
Multiuser transmitted reference ultra-wideband communication systems
Abstract--A conventional transmitted reference (TR) modulation scheme is an effective means to combat severe multipath distortion in an ultra-wideband (UWB) system, significantly r...
Zhengyuan Xu, Brian M. Sadler
NETWORK
2006
177views more  NETWORK 2006»
13 years 9 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang