Sciweavers

295 search results - page 19 / 59
» Severity Levels of Inconsistent Code
Sort
View
SCAM
2003
IEEE
14 years 2 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
MIDDLEWARE
2004
Springer
14 years 3 months ago
Platform Independent Model Transformation Based on Triple
Reuse is an important topic in software engineering as it promises advantages like faster time-to-market and cost reduction. Reuse s on an abstract level is more beneficial than o...
Andreas Billig, Susanne Busse, Andreas Leicher, J&...
IACR
2011
125views more  IACR 2011»
12 years 9 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
ICASSP
2008
IEEE
14 years 4 months ago
Transmit codes and receive filters for pulse compression radar systems
Pulse compression radar systems make use of transmit code sequences and receive filters that are specially designed to achieve good range resolution and target detection capabili...
Petre Stoica, Jian Li, Ming Xue
CODES
2005
IEEE
13 years 11 months ago
Hardware/software partitioning of software binaries: a case study of H.264 decode
We describe results of a case study whose intent was to determine whether new techniques for hardware/software partitioning of an application’s binary are competitive with parti...
Greg Stitt, Frank Vahid, Gordon McGregor, Brian Ei...