Sciweavers

4979 search results - page 91 / 996
» Batch codes and their applications
Sort
View
WCRE
2010
IEEE
14 years 8 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
CORR
2010
Springer
75views Education» more  CORR 2010»
14 years 8 months ago
Dense Error-Correcting Codes in the Lee Metric
Several new applications and a number of new mathematical techniques have increased the research on errorcorrecting codes in the Lee metric in the last decade. In this work we cons...
Tuvi Etzion, Alexander Vardy, Eitan Yaakobi
WISEC
2010
ACM
14 years 8 months ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu
TIT
1998
139views more  TIT 1998»
14 years 9 months ago
Codes for Digital Recorders
—Constrained codes are a key component in the digital recording devices that have become ubiquitous in computer data storage and electronic entertainment applications. This paper...
Kees A. Schouhamer Immink, Paul H. Siegel, Jack K....
ICASSP
2011
IEEE
14 years 1 months ago
Scheduling of CAL actor networks based on dynamic code analysis
CAL is a dataflow oriented language for writing high-level specifications of signal processing applications. The language has recently been standardized and selected for the new...
Jani Boutellier, Olli Silvén, Mickaël ...