Sciweavers

1629 search results - page 29 / 326
» Infeasible Code Detection
Sort
View
INFOCOM
2012
IEEE
12 years 16 days ago
On detecting pollution attacks in inter-session network coding
Abstract—Dealing with pollution attacks in inter-session network coding is challenging due to the fact that sources, in addition to intermediate nodes, can be malicious. In this ...
Anh Le, Athina Markopoulou
KBSE
2008
IEEE
14 years 4 months ago
SpotWeb: Detecting Framework Hotspots and Coldspots via Mining Open Source Code on the Web
—Software developers often face challenges in reusing open source frameworks due to several factors such as the framework complexity and lack of proper documentation. In this pap...
Suresh Thummalapenta, Tao Xie
GLOBECOM
2007
IEEE
14 years 4 months ago
Maximum Likelihood Detection and Optimal Code Design for Differential Unitary Space-Time Modulation with Carrier Frequency Offse
Abstract— In this paper, we answer the question that “Can conventional differential unitary space time modulation (DUSTM) be applied when there is an unknown carrier frequency ...
Tao Cui, Feifei Gao, Arumugam Nallanathan, Chintha...
ECCV
2006
Springer
14 years 1 months ago
Robust Multi-view Face Detection Using Error Correcting Output Codes
Abstract. This paper presents a novel method to solve multi-view face detection problem by Error Correcting Output Codes (ECOC). The motivation is that face patterns can be divided...
Hongming Zhang, Wen Gao, Xilin Chen, Shiguang Shan...
SIGSOFT
2005
ACM
14 years 3 months ago
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code
Programs usually follow many implicit programming rules, most of which are too tedious to be documented by programmers. When these rules are violated by programmers who are unawar...
Zhenmin Li, Yuanyuan Zhou