Sciweavers

2068 search results - page 357 / 414
» On Effectiveness of Application-Layer Coding
Sort
View
ACSAC
2007
IEEE
15 years 10 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
CODES
2007
IEEE
15 years 10 months ago
Performance modeling for early analysis of multi-core systems
Performance analysis of microprocessors is a critical step in defining the microarchitecture, prior to register-transfer-level (RTL) design. In complex chip multiprocessor systems...
Reinaldo A. Bergamaschi, Indira Nair, Gero Dittman...
ICMCS
2007
IEEE
104views Multimedia» more  ICMCS 2007»
15 years 10 months ago
A Perception-based Scalable Encryption Model for AVS Audio
Audio Video coding Standard (AVS) is China’s secondgeneration source coding/decoding standard with fully Intellectual Properties. As the sixth part of AVS standard, AVSDRM aims ...
Lan Juan, Huang Tie-Jun, Qu Jun-Hua
SMC
2007
IEEE
111views Control Systems» more  SMC 2007»
15 years 10 months ago
Prediction method to maintain QoS in weather impacted wireless and satellite networks
—Rain and snow can have a distorting effect on Ku and Ka bands signal fidelity resulting in excessive digital transmission errors. This loss of signal attenuation is commonly ref...
Kamal Harb, Anand Srinivasan, Changcheng Huang, Br...
LCTRTS
2007
Springer
15 years 10 months ago
Addressing instruction fetch bottlenecks by using an instruction register file
The Instruction Register File (IRF) is an architectural extension for providing improved access to frequently occurring instructions. An optimizing compiler can exploit an IRF by ...
Stephen Roderick Hines, Gary S. Tyson, David B. Wh...