Sciweavers

7189 search results - page 338 / 1438
» Connecting Design with Code
Sort
View
ISCAS
2006
IEEE
98views Hardware» more  ISCAS 2006»
15 years 10 months ago
Towards rate-distortion tradeoff in real-time color video coding
—In this paper, we address the key problem in real-time video coding, the rate-distortion (R-D) tradeoff. As most video coding applications employ color images, we analyze the R-...
Zhenzhong Chen, King Ngi Ngan
VTC
2006
IEEE
142views Communications» more  VTC 2006»
15 years 10 months ago
Adaptive Bit-Interleaved Coded OFDM over Time-Varying Channels
When adapting the transmitter to the channel state information (CSI), improved transmission is possible compared to the open loop system where no CSI is provided at the transmitte...
Jin Soo Choi, Chang-Kyung Sung, Sung Hyun Moon, In...
CASES
2004
ACM
15 years 9 months ago
A post-compiler approach to scratchpad mapping of code
ScratchPad Memories (SPMs) are commonly used in embedded systems because they are more energy-efficient than caches and enable tighter application control on the memory hierarchy...
Federico Angiolini, Francesco Menichelli, Alberto ...
ICSE
1995
IEEE-ACM
15 years 8 months ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
WORM
2003
15 years 5 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...