Sciweavers

3373 search results - page 339 / 675
» Linear transformations on codes
Sort
View
166
Voted
CCS
2007
ACM
15 years 8 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
147
Voted
FCCM
2004
IEEE
175views VLSI» more  FCCM 2004»
15 years 7 months ago
A Flexible Hardware Encoder for Low-Density Parity-Check Codes
We describe a flexible hardware encoder for regular and irregular low-density parity-check (LDPC) codes. Although LDPC codes achieve achieve better performance and lower decoding ...
Dong-U Lee, Wayne Luk, Connie Wang, Christopher Jo...
170
Voted
ECCC
2011
204views ECommerce» more  ECCC 2011»
14 years 7 months ago
Dense locally testable codes cannot have constant rate and distance
A q-query locally testable code (LTC) is an error correcting code that can be tested by a randomized algorithm that reads at most q symbols from the given word. An important questi...
Irit Dinur, Tali Kaufman
FCCM
2003
IEEE
148views VLSI» more  FCCM 2003»
15 years 9 months ago
A Hardware Gaussian Noise Generator for Channel Code Evaluation
Hardware simulation of channel codes offers the potential of improving code evaluation speed by orders of magnitude over workstation- or PC-based simulation. We describe a hardwar...
Dong-U Lee, Wayne Luk, John D. Villasenor, Peter Y...
TPDS
2008
87views more  TPDS 2008»
15 years 4 months ago
rStream: Resilient and Optimal Peer-to-Peer Streaming with Rateless Codes
Due to the lack of stability and reliability in peer-to-peer networks, multimedia streaming over peer-to-peer networks represents several fundamental engineering challenges. First...
Chuan Wu, Baochun Li