Sciweavers

3456 search results - page 34 / 692
» Byte Code Engineering
Sort
View
CODES
2002
IEEE
15 years 4 months ago
Fast processor core selection for WLAN modem using mappability estimation
Juha-Pekka Soininen, Jari Kreku, Yang Qu, Martti F...
INFOCOM
2010
IEEE
14 years 9 months ago
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution a...
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khu...
ICIP
2008
IEEE
16 years 1 months ago
Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximizatio
Media authentication and tampering localization are important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded v...
Yao-Chung Lin, David P. Varodayan, Torsten Fink, E...
VTC
2007
IEEE
125views Communications» more  VTC 2007»
15 years 6 months ago
Channel Decoder Assisted Adaptive Coding and Modulation for HAP Communications
Provision of mobile broadband wireless access, for instance via high altitude platforms (HAPs) to the passengers on a high-speed train, requires the development of efficient and r...
Miha Smolnikar, Tomaz Javornik, Mihael Mohorcic
AAAI
2008
15 years 2 months ago
Learning to Analyze Binary Computer Code
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...