Sciweavers

787 search results - page 82 / 158
» Source code analysis and manipulation
Sort
View
BIOID
2008
149views Biometrics» more  BIOID 2008»
14 years 13 hour ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....
CORR
2008
Springer
124views Education» more  CORR 2008»
13 years 10 months ago
High Performance Cooperative Transmission Protocols Based on Multiuser Detection and Network Coding
Abstract--Cooperative transmission is an emerging communication technique that takes advantage of the broadcast nature of wireless channels. However, due to low spectral efficiency...
Zhu Han, Xin Zhang, H. Vincent Poor
ACMSE
2006
ACM
13 years 12 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
WOMPAT
2004
Springer
14 years 3 months ago
Dragon: A Static and Dynamic Tool for OpenMP
A program analysis tool can play an important role in helping users understand and improve OpenMP codes. Dragon is a robust interactive program analysis tool based on the Open64 co...
Oscar Hernandez, Chunhua Liao, Barbara M. Chapman
INFOCOM
2009
IEEE
14 years 4 months ago
Network Coding Meets TCP
—We propose a mechanism that incorporates network coding into TCP with only minor changes to the protocol stack, thereby allowing incremental deployment. In our scheme, the sourc...
Jay Kumar Sundararajan, Devavrat Shah, Muriel M&ea...