Sciweavers

4764 search results - page 411 / 953
» Applications of Error-Control Coding
Sort
View
166
Voted
NIPS
2007
15 years 4 months ago
Mining Internet-Scale Software Repositories
Large repositories of source code create new challenges and opportunities for statistical machine learning. Here we first develop Sourcerer, an infrastructure for the automated c...
Erik Linstead, Paul Rigor, Sushil Krishna Bajracha...
144
Voted
CORR
2010
Springer
184views Education» more  CORR 2010»
15 years 3 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
114
Voted
JSAC
2010
119views more  JSAC 2010»
15 years 1 months ago
Low-Floor Detection/Decoding of LDPC-Coded Partial Response Channels
Abstract— There is a well-known error-floor phenomenon associated with iterative LDPC decoders which has delayed the use of LDPC codes in certain communication and storage syste...
Yang Han, William E. Ryan
146
Voted
VIROLOGY
2010
179views more  VIROLOGY 2010»
15 years 1 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
179
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald