• Publications
  • Influence
Securing web application code by static analysis and runtime protection
TLDR
We created a lattice-based static analysis algorithm derived from type systems and typestate, and addressed its soundness. Expand
  • 623
  • 24
  • PDF
Compressed Sensing Detector Design for Space Shift Keying in MIMO Systems
TLDR
We propose a compressed sensing based detector, NCS, by formulating the SSK-type detection criterion as a convex optimization problem, outperforming the O(NrNtnt) complexity in the ML detector, at the cost of slight fidelity degradation. Expand
  • 82
  • 23
  • PDF
Determining terminal-pair reliability based on edge expansion diagrams using OBDD
For calculating terminal-pair reliability, most published algorithms are based on the sum of disjoint products. However, these tree-based partitions lack the capability to avoid redundant computationExpand
  • 144
  • 19
Efficient Spare Allocation for Reconfigurable Arrays
TLDR
The authors present two algorithms for spare allocation that are based on graph-theoretic analysis. Expand
  • 214
  • 13
Resource Allocation with Interference Avoidance in OFDMA Femtocell Networks
TLDR
This paper investigates a self-organization strategy for physical resource block (PRB) allocation with QoS constraints to avoid the co-channel and co-tiered interference. Expand
  • 174
  • 13
  • PDF
Efficient Spare Allocation in Reconfigurable Arrays
  • S. Kuo, W. Fuchs
  • Computer Science
  • 23rd ACM/IEEE Design Automation Conference
  • 1986
TLDR
The issue of yield degradation due to physical failures in large memory and processor arrays is of significant importance to semiconductor manufacturers. Expand
  • 124
  • 13
  • PDF
Efficient Spare Allocation for Reconfigurable Arrays
TLDR
The authors present two algorithms for spare allocation that are based on graph-theoretic analysis. Expand
  • 105
  • 11
Mobile Sensor Network Resilient Against Node Replication Attacks
TLDR
In this paper, a novel protocol, called extremely Efficient Detection (XED), is proposed to resist against node replication attacks in mobile sensor networks. Expand
  • 90
  • 11
  • PDF
Analysis of incorporating logistic testing-effort function into software reliability modeling
TLDR
This paper investigates a SRGM (software reliability growth model) based on the NHPP (nonhomogeneous Poisson process) which incorporates a logistic testing-effort function and shows that it gives a good predictive capability based on real failure-data. Expand
  • 162
  • 10
  • PDF
An Assessment of Testing-Effort Dependent Software Reliability Growth Models
TLDR
We describe how to incorporate the logistic testing-effort function into both exponential-type, and S-shaped software reliability models and show that the proposed models can give better predictions. Expand
  • 142
  • 10
  • PDF
...
1
2
3
4
5
...