Sciweavers

1183 search results - page 138 / 237
» Efficient Wet Paper Codes
Sort
View
APSEC
2004
IEEE
15 years 1 months ago
Binary-Level Lightweight Data Integration to Develop Program Understanding Tools for Embedded Software in C
In embedded software development, the programming language C and inline assembly code are traditionally widely used. However, tools for C program-understanding, e.g., cross-refere...
Katsuhiko Gondow, Tomoya Suzuki II, Hayato Kawashi...
81
Voted
EUROCRYPT
2000
Springer
15 years 1 months ago
Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5
Abstract. This paper describes new techniques for fast correlation attacks, based on Gallager iterative decoding algorithm using parity-check equations of weight greater than 3. Th...
Anne Canteaut, Michaël Trabbia
DAGSTUHL
2006
14 years 11 months ago
Coxeter Lattice Paths
Supercomputing applications usually involve the repeated parallel application of discretized differential operators. Difficulties arise with higher-order discretizations their com...
Thomas J. Ashby, Anthony D. Kennedy, Stephen M. Wa...
78
Voted
SIGPRO
2002
114views more  SIGPRO 2002»
14 years 9 months ago
Error resilience and recovery in streaming of embedded video
The three-dimensional (3-D) SPIHT coder is a scalable or embedded coder that has proved its efficiency and its real-time capability in compression of video. A forward-error-correc...
Sungdae Cho, William A. Pearlman
TISSEC
2002
123views more  TISSEC 2002»
14 years 9 months ago
An algebraic approach to IP traceback
We present a new solution to the problem of determining the path a packet traversed over the Internet (called the traceback problem) during a denial of service attack. Previous so...
Drew Dean, Matthew K. Franklin, Adam Stubblefield