Sciweavers

4764 search results - page 840 / 953
» Applications of Error-Control Coding
Sort
View
CCS
2010
ACM
15 years 3 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
ICASSP
2010
IEEE
15 years 3 months ago
A novel watermarking scheme with compensation in bit-stream domain for H.264/AVC
Currently, most of the watermarking algorithms for H.264/AVC video coding standard are encoder-based due to their high perceptual quality. However, for the compressed video, they ...
Liwei Zhang, Yuesheng Zhu, Lai-Man Po
113
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Enhanced trellis based vector quantization for coordinated beamforming
This paper presents two techniques to boost the quantization performance of trelli-based beamforming vector quantization schemes [?], [?]. It is well known that tail-biting trelli...
Chun Kin Au-Yeung, Shahab Sanayei
ECMDAFA
2010
Springer
132views Hardware» more  ECMDAFA 2010»
15 years 3 months ago
An Integrated Facet-Based Library for Arbitrary Software Components
Reuse is an important means of reducing costs and effort during the development of complex software systems. A major challenge is to find suitable components in a large library wit...
Matthias Schmidt, Jan Polowinski, Jendrik Johannes...
ADHOC
2010
163views more  ADHOC 2010»
15 years 3 months ago
A probabilistic method for cooperative hierarchical aggregation of data in VANETs
We propose an algorithm for the hierarchical aggregation of observations in dissemination-based, distributed traffic information systems. Instead of transmitting observed paramete...
Christian Lochert, Björn Scheuermann, Martin ...