Sciweavers

215 search results - page 17 / 43
» The asymptotic number of binary codes and binary matroids
Sort
View
ICDCS
2008
IEEE
15 years 6 months ago
Analysis of Maximum Executable Length for Detecting Text-Based Malware
The possibility of using purely text stream (keyboardenterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, fr...
P. Kumar Manna, Sanjay Ranka, Shigang Chen
ICDAR
2011
IEEE
13 years 11 months ago
Low Resolution QR-Code Recognition by Applying Super-Resolution Using the Property of QR-Codes
—This paper proposes a method for low resolution QR-code recognition. A QR-code is a two-dimensional binary symbol that can embed various information such as characters and numbe...
Yuji Kato, Daisuke Deguchi, Tomokazu Takahashi, Ic...
TCOM
2008
63views more  TCOM 2008»
14 years 11 months ago
A general construction of constrained parity-check codes for optical recording
This paper proposes a general and systematic code design method to efficiently combine constrained codes with parity-check (PC) codes for optical recording. The proposed constraine...
Kui Cai, Kees A. Schouhamer Immink
CORR
2011
Springer
203views Education» more  CORR 2011»
14 years 6 months ago
AWGN Channel Analysis of Terminated LDPC Convolutional Codes
— It has previously been shown that ensembles of terminated protograph-based low-density parity-check (LDPC) convolutional codes have a typical minimum distance that grows linear...
David G. M. Mitchell, Michael Lentmaier, Daniel J....
STOC
1994
ACM
134views Algorithms» more  STOC 1994»
15 years 3 months ago
A coding theorem for distributed computation
Shannon's Coding Theorem shows that in order to reliably transmit a message of T bits over a noisy communication channel, only a constant slowdown factor is necessary in the ...
Sridhar Rajagopalan, Leonard J. Schulman