Sciweavers

1629 search results - page 44 / 326
» Infeasible Code Detection
Sort
View
INFOCOM
2003
IEEE
14 years 3 months ago
Robust Location Detection in Emergency Sensor Networks
— We propose a new framework for providing robust location detection in emergency response systems, based on the theory of identifying codes. The key idea of this approach is to ...
Saikat Ray, Rachanee Ungrangsi, Francesco De Pelle...
KBSE
2006
IEEE
14 years 4 months ago
Reverse Engineering of Design Patterns from Java Source Code
Recovering design patterns can enhance existing source code analysis tools by bringing program understanding to the design level. This paper presents a new, fully automated patter...
Nija Shi, Ronald A. Olsson
WCNC
2008
IEEE
14 years 4 months ago
Iterative Detection of Three-Stage Concatenated FFH-MFSK
Abstract— Serially concatenated and iteratively decoded Irregular Variable Length Coding (IrVLC) combined with precoded Fast Frequency Hopping (FFH) M-ary Frequency Shift Keying ...
Sohail Ahmed, Robert G. Maunder, Lie-Liang Yang, L...
TCSV
2008
145views more  TCSV 2008»
13 years 10 months ago
Robust Streaming of Offline Coded H.264/AVC Video Via Alternative Macroblock Coding
Abstract--An error resilient video streaming scheme that transmits offline coded H.264/AVC video through erroneous channels, called the alternative macroblock coding (AMC) scheme, ...
Xiaosong Zhou, C. C. Jay Kuo
IASTEDSEA
2004
13 years 11 months ago
ARIES: Refactoring support environment based on code clone analysis
Code clone has been regarded as one of factors that make software maintenance more difficult. A code clone is a code fragment in a source code that is identical or similar to anot...
Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, K...