Sciweavers

2797 search results - page 132 / 560
» Code query by example
Sort
View
CORR
2011
Springer
203views Education» more  CORR 2011»
14 years 10 months ago
AWGN Channel Analysis of Terminated LDPC Convolutional Codes
— It has previously been shown that ensembles of terminated protograph-based low-density parity-check (LDPC) convolutional codes have a typical minimum distance that grows linear...
David G. M. Mitchell, Michael Lentmaier, Daniel J....
CORR
2011
Springer
178views Education» more  CORR 2011»
14 years 10 months ago
Anytime Reliable Codes for Stabilizing Plants over Erasure Channels
—The problem of stabilizing an unstable plant over a noisy communication link is an increasingly important one that arises in problems of distributed control and networked contro...
Ravi Teja Sukhavasi, Babak Hassibi
CCS
2001
ACM
15 years 7 months ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
MOBICOM
1999
ACM
15 years 7 months ago
Using Code Mobility to Create Ubiquitous and Active Augmented Reality in Mobile Computing
The concept augmented reality is used to describe a system that supplements reality by adding virtual objects into a real-world view. This paper describes a flexible mobile code a...
Kari Kangas, Juha Röning
CSREASAM
2006
15 years 4 months ago
Cryptcoding - Encryption and Error-Correction Coding in a Single Step
In this paper we re-open a 25 years old question of joint encryption and error-correction coding, named here as Cryptcoding. Cryptcoding is a procedure in which encryption/decrypti...
Danilo Gligoroski, Svein J. Knapskog, Suzana Andov...