Sciweavers

677 search results - page 40 / 136
» On the reconstruction of perfect codes
Sort
View
CORR
2010
Springer
67views Education» more  CORR 2010»
14 years 7 months ago
Secret Sharing LDPC Codes for the Constrained Gaussian Wiretap Channel
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presenc...
Chan Wong Wong, Tan F. Wong, John M. Shea
89
Voted
CORR
2007
Springer
82views Education» more  CORR 2007»
14 years 9 months ago
One-bit Distributed Sensing and Coding for Field Estimation in Sensor Networks
Abstract—This paper formulates and studies a general distributed field reconstruction problem using a dense network of noisy one-bit randomized scalar quantizers in the presence...
Ye Wang, Prakash Ishwar, Venkatesh Saligrama
WCRE
2010
IEEE
14 years 8 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
PLDI
2005
ACM
15 years 3 months ago
TraceBack: first fault diagnosis by reconstruction of distributed control flow
Faults that occur in production systems are the most important faults to fix, but most production systems lack the debugging facilities present in development environments. TraceB...
Andrew Ayers, Richard Schooler, Chris Metcalf, Ana...
EUROPAR
2008
Springer
14 years 11 months ago
Efficiently Building the Gated Single Assignment Form in Codes with Pointers in Modern Optimizing Compilers
Abstract. Understanding program behavior is at the foundation of program optimization. Techniques for automatic recognition of program constructs characterize the behavior of code ...
Manuel Arenaz, Pedro Amoedo, Juan Touriño