Sciweavers

1184 search results - page 191 / 237
» Algorithmic Results in List Decoding
Sort
View
120
Voted
ESORICS
2007
Springer
15 years 9 months ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
131
Voted
CASES
2004
ACM
15 years 9 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
DATE
2010
IEEE
154views Hardware» more  DATE 2010»
15 years 8 months ago
ERSA: Error Resilient System Architecture for probabilistic applications
There is a growing concern about the increasing vulnerability of future computing systems to errors in the underlying hardware. Traditional redundancy techniques are expensive for...
Larkhoon Leem, Hyungmin Cho, Jason Bau, Quinn A. J...
126
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Hiding information inside structured shapes
This paper describes a new technique for embedding a message within structured shapes. It is desired that my changes in the shape owing to the embedded message are invisible to a ...
Samarjit Das, Shantanu Rane, Anthony Vetro
131
Voted
BMCBI
2010
87views more  BMCBI 2010»
15 years 3 months ago
poolMC: Smart pooling of mRNA samples in microarray experiments
Background: Typically, pooling of mRNA samples in microarray experiments implies mixing mRNA from several biological-replicate samples before hybridization onto a microarray chip....
Raghunandan M. Kainkaryam, Angela Bruex, Anna C. G...