Sciweavers

TIT
2011
144views more  TIT 2011»
13 years 7 months ago
Network Generalized Hamming Weight
— In this paper, we extend the notion of generalized Hamming weight for classical linear block code to linear network codes by introducing the network generalized Hamming weight ...
Chi Kin Ngai, Raymond W. Yeung, Zhen Zhang
BMCBI
2011
13 years 7 months ago
Simulated evolution applied to study the genetic code optimality using a model of codon reassignments
Background: As the canonical code is not universal, different theories about its origin and organization have appeared. The optimization or level of adaptation of the canonical ge...
Jose Santos, Ángel Monteagudo
APSEC
2010
IEEE
13 years 7 months ago
The Qualitas Corpus: A Curated Collection of Java Code for Empirical Studies
Abstract--In order to increase our ability to use measurement to support software development practise we need to do more analysis of code. However, empirical studies of code are e...
Ewan D. Tempero, Craig Anslow, Jens Dietrich, Ted ...
ACSAC
2010
IEEE
13 years 9 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
CLEIEJ
2010
13 years 9 months ago
Quality Improvement in Annotated Code
In order to customize their behavior at runtime, a wide sort of modern frameworks do use code annotations at the applications classes as metadata configuration. However, despite i...
Diego A. A. Correia, Eduardo M. Guerra, Fáb...
ICFEM
2009
Springer
13 years 10 months ago
Implementing a Direct Method for Certificate Translation
Abstract. Certificate translation is a method that transforms certificates of source programs into certificates of their compilation. It provides strong guarantees on low-level cod...
Gilles Barthe, Benjamin Grégoire, Sylvain H...
ICC
2009
IEEE
146views Communications» more  ICC 2009»
13 years 10 months ago
On Construction of Moderate-Length LDPC Codes over Correlated Erasure Channels
The design of moderate-length erasure correcting low-density parity-check (LDPC) codes over correlated erasure channels is considered. Although the asymptotic LDPC code design rema...
Gianluigi Liva, Balázs Matuz, Zoltán...
GLOBECOM
2009
IEEE
13 years 10 months ago
Cooperative Uplink of Two Mobile Stations with Network Coding Based on the WiMax LDPC Code
We consider the uplink of two mobile stations with the help of one common relay. Recently, joint network-channel coding based on LDPC codes was proposed for this setup where the ch...
Lena Chebli, Christoph Hausl, Georg Zeitler, Ralf ...
EUROPAR
2009
Springer
13 years 10 months ago
Argument Controlled Profiling
Profiling tools relate measurements to code context such as function names in order to guide code optimization. For a more detailed analysis, call path or phase-based profiling enh...
Tilman Küstner, Josef Weidendorfer, Tobias We...
WISEC
2010
ACM
13 years 10 months ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu