Sciweavers

336 search results - page 37 / 68
» Source coding and channel requirements for unstable processe...
Sort
View
COOTS
2001
13 years 10 months ago
Kava - Using Byte code Rewriting to add Behavioural Reflection to Java
Many authors have proposed using byte code rewriting as a way of adapting or extending the behaviour of Java There are toolkits available that simplify this process and raise the ...
Ian Welch, Robert J. Stroud
ICSE
2012
IEEE-ACM
11 years 11 months ago
make test-zesti: A symbolic execution solution for improving regression testing
Abstract—Software testing is an expensive and time consuming process, often involving the manual creation of comprehensive regression test suites. However, current testing method...
Paul Dan Marinescu, Cristian Cadar
ICASSP
2008
IEEE
14 years 2 months ago
Substituting the cumulants in the super-exponential blind equalization algorithm
The Shalvi-Weinstein super-exponential algorithm for blind channel equalization employs empirical high-order cross-cumulants between the equalizer’s input and output for iterati...
Arie Yeredor
ICDE
2007
IEEE
193views Database» more  ICDE 2007»
14 years 9 months ago
Categorization and Optimization of Synchronization Dependencies in Business Processes
requirement. Furthermore, programming using sequence constructs normally produce nested structures and The current approachfor modeling synchronization in scattered code, especiall...
Qinyi Wu, Calton Pu, Akhil Sahai, Roger S. Barga
INFOCOM
2010
IEEE
13 years 6 months ago
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution a...
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khu...