Sciweavers

500 search results - page 14 / 100
» codes 1998
Sort
View
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 8 months ago
On two variations of identifying codes
Identifying codes have been introduced in 1998 to model fault-detection in multiprocessor systems. In this paper, we introduce two variations of identifying codes: weak codes and ...
Olivier Delmas, Sylvain Gravier, Mickaël Mont...
TIT
1998
85views more  TIT 1998»
13 years 8 months ago
Generalized Hamming Weights of q-ary Reed-Muller Codes
The order bound on generalized Hamming weights is introduced in a general setting of codes on varieties which comprises both the one point geometric Goppa codes as the q-ary Reed-M...
Petra Heijnen, Ruud Pellikaan
TIT
1998
79views more  TIT 1998»
13 years 8 months ago
Greedy and Heuristic Algorithms for Codes and Colorings
Abstract— Many of the fundamental coding problems can be represented as graph problems. These problems are often intrinsically difficult and unsolved even if the code length is ...
Tuvi Etzion, Patric R. J. Östergård
ECOOPW
1998
Springer
14 years 26 days ago
Visual Detection of Duplicated Code
Code duplication is considered as bad practice that complicates the maintenance and evolution of software. Detecting duplicated code is a difficult task because of the large amoun...
Matthias Rieger, Stéphane Ducasse
SP
1998
IEEE
147views Security Privacy» more  SP 1998»
14 years 27 days ago
Secure Execution of Java Applets using a Remote Playground
Dahlia Malkhi, Michael K. Reiter, Aviel D. Rubin