Sciweavers

1629 search results - page 61 / 326
» Infeasible Code Detection
Sort
View
GLOBECOM
2008
IEEE
14 years 4 months ago
Using Higher Order Cyclostationarity to Identify Space-Time Block Codes
—Research in cognitive radios has renewed interest in tools, such as spectrum estimation and modulation identification, to characterize the radio frequency (RF) environment. The...
Marcus R. DeYoung, Robert W. Heath Jr., Brian L. E...
WS
2006
ACM
14 years 4 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
VTS
2005
IEEE
89views Hardware» more  VTS 2005»
14 years 3 months ago
Synthesis of Low Power CED Circuits Based on Parity Codes
An automated design procedure is described for synthesizing circuits with low power concurrent error detection. It is based on pre-synthesis selection of a parity-check code follo...
Shalini Ghosh, Sugato Basu, Nur A. Touba
CORR
2010
Springer
94views Education» more  CORR 2010»
13 years 10 months ago
Unidirectional Error Correcting Codes for Memory Systems: A Comparative Study
In order to achieve fault tolerance, highly reliable system often require the ability to detect errors as soon as they occur and prevent the speared of erroneous information throu...
Muzhir Al-Ani, Qeethara Al-Shayea
ESORICS
2011
Springer
12 years 10 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller