—In this paper, we address the key problem in real-time video coding, the rate-distortion (R-D) tradeoff. As most video coding applications employ color images, we analyze the R-...
When adapting the transmitter to the channel state information (CSI), improved transmission is possible compared to the open loop system where no CSI is provided at the transmitte...
Jin Soo Choi, Chang-Kyung Sung, Sung Hyun Moon, In...
ScratchPad Memories (SPMs) are commonly used in embedded systems because they are more energy-efficient than caches and enable tighter application control on the memory hierarchy...
Federico Angiolini, Francesco Menichelli, Alberto ...
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...