Sciweavers

1629 search results - page 52 / 326
» Infeasible Code Detection
Sort
View
GLOBECOM
2009
IEEE
14 years 5 months ago
Iteratively Detected Three-Stage Multi-Dimensional Sphere Packing Modulation Aided Multi-Functional MIMO
Abstract— This paper presents a novel multi-functional MultipleInput Multiple-Output (MIMO) scheme that combines the benefits of the Vertical Bell Labs Layered Space-Time (V-BLA...
Mohammed El-Hajjar, Osamah Alamri, Lajos Hanzo
ICSM
1995
IEEE
14 years 1 months ago
Detecting interleaving
The various goals and requirements of a system are realized in software as fragments of code that are typically \interleaved" in that they may be woven together in the same c...
Spencer Rugaber, Kurt Stirewalt, Linda M. Wills
SIGSOFT
2009
ACM
14 years 11 months ago
ConcernMorph: metrics-based detection of crosscutting patterns
Crosscutting concerns can hinder maintainability of a design because they do not adhere to a system's underlying modular structure. Developers, therefore, may wish to refacto...
Eduardo Figueiredo, Jon Whittle, Alessandro F. Gar...
ACSAC
2006
IEEE
14 years 4 months ago
Static Detection of Vulnerabilities in x86 Executables
In the last few years, several approaches have been proposed to perform vulnerability analysis of applications written in high-level languages. However, little has been done to au...
Marco Cova, Viktoria Felmetsger, Greg Banks, Giova...
WCE
2007
13 years 11 months ago
Analysis of User Specific Interleavers for Iterative Multi-User Detection System
—Interleave division multiple access (IDMA) and orthogonal frequency division multiplexing – interleave division multiple access (OFDM-IDMA) have been proposed for beyond third...
Omer Nawaz, Waqas Nasir, Zia Bhadiar, Imtiaz Ahmed...