Sciweavers

1245 search results - page 138 / 249
» Binary Sparse Coding
Sort
View
CCS
2001
ACM
15 years 8 months ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
CORR
2010
Springer
108views Education» more  CORR 2010»
15 years 3 months ago
On Graphs and Codes Preserved by Edge Local Complementation
Orbits of graphs under local complementation (LC) and edge local complementation (ELC) have been studied in several different contexts. For instance, there are connections between...
Lars Eirik Danielsen, Matthew G. Parker, Constanza...
144
Voted
COMPSEC
2004
105views more  COMPSEC 2004»
15 years 3 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
120
Voted
IJCES
2002
100views more  IJCES 2002»
15 years 3 months ago
Neural Network Decoders for Linear Block Codes
This paper presents a class of neural networks suitable for the application of decoding error-correcting codes.The neural model is basically a perceptron with a high-order polynom...
Ja-Ling Wu, Yuen-Hsien Tseng, Yuh-Ming Huang
94
Voted
TCOM
2010
68views more  TCOM 2010»
15 years 1 months ago
Coded multipulse pulse-position modulation for free-space optical communications
—In this letter, we address two questions concerning the application of multipulse pulse-position modulation (MPPM) for free-space optical (FSO) communications: (1) under what co...
Trung Thanh Nguyen, Lutz H.-J. Lampe