Sciweavers

1629 search results - page 47 / 326
» Infeasible Code Detection
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
Towards improving network flow watermarks using the repeat-accumulate codes
Network intruders try to hide their identity by relaying their traf c through a number of intermediate hosts, called stepping stones. Network ow watermarks have been used to detec...
Amir Houmansadr, Nikita Borisov
APSEC
2007
IEEE
14 years 2 months ago
Simultaneous Modification Support based on Code Clone Analysis
Maintaining software systems becomes more difficult as their size and complexity increase. One factor that makes software maintenance more difficult is the presence of code clones...
Yoshiki Higo, Yasushi Ueda, Shinji Kusumoto, Katsu...
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 10 months ago
Performance Analysis of Iterative Channel Estimation and Multiuser Detection in Multipath DS-CDMA Channels
Abstract--This paper examines the performance of decisionfeedback-based iterative channel estimation and multiuser detection in channel coded aperiodic direct sequence code divisio...
Husheng Li, Sharon M. Betz, H. Vincent Poor
SC
2000
ACM
14 years 1 months ago
Hardware Prediction for Data Coherency of Scientific Codes on DSM
This paper proposes a hardware mechanism for reducing coherency overhead occurring in scientific computations within DSM systems. A first phase aims at detecting, in the address s...
Jean-Thomas Acquaviva, William Jalby
ICCV
2009
IEEE
15 years 3 months ago
A Probabilistic Framework for Partial Intrinsic Symmetries in Geometric Data
In this paper, we present a novel algorithm for partial intrinsic symmetry detection in 3D geometry. Unlike previous work, our algorithm is based on a conceptually simple and st...
Ruxandra Lasowski, Art Tevs, Hans-Peter Seidel, Mi...