Sciweavers

1629 search results - page 28 / 326
» Infeasible Code Detection
Sort
View
ICASSP
2008
IEEE
14 years 4 months ago
Listener detection of talker stress in low-rate coded speech
We describe an experiment where listeners were asked to detect two specific forms of stress in talkers’ recorded voices heard via six different simulated communication systems. ...
Stephen Voran
GECCO
2008
Springer
116views Optimization» more  GECCO 2008»
13 years 11 months ago
Evolving similarity functions for code plagiarism detection
Students are often asked to submit electronic copies of their program code as part of assessment in computer science courses. To counter code plagiarism, educational institutions ...
Victor Ciesielski, Nelson Wu, Seyed M. M. Tahaghog...
CCS
2011
ACM
12 years 10 months ago
The power of procrastination: detection and mitigation of execution-stalling malicious code
Malware continues to remain one of the most important security problems on the Internet today. Whenever an anti-malware solution becomes popular, malware authors typically react p...
Clemens Kolbitsch, Engin Kirda, Christopher Kruege...
VTC
2008
IEEE
278views Communications» more  VTC 2008»
14 years 4 months ago
Error Detection Reliability of LTE CRC Coding
—The error detection performance of CRC coding in LTE with general two-level early stopping algorithms for turbo decoding is investigated. Analytical models for the probability o...
Jung-Fu Cheng, Havish Koorapaty
ICSE
2010
IEEE-ACM
13 years 8 months ago
Code clone detection in practice
Due to the negative impact of code cloning on software maintenance efforts as well as on program correctness [4–6], the duplication of code is generally viewed as problematic. ...
Florian Deissenboeck, Benjamin Hummel, Elmar J&uum...