Sciweavers

5962 search results - page 272 / 1193
» Working with Patterns and Code
Sort
View
137
Voted
ACSC
2006
IEEE
15 years 10 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
139
Voted
ACSAC
2005
IEEE
15 years 10 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
CORR
2008
Springer
121views Education» more  CORR 2008»
15 years 4 months ago
Cascaded Orthogonal Space-Time Block Codes for Wireless Multi-Hop Relay Networks
Distributed space-time block coding is a diversity technique to mitigate the effects of fading in multi-hop wireless networks, where multiple relay stages are used by a source to ...
Rahul Vaze, Robert W. Heath Jr.
164
Voted
CORR
2006
Springer
141views Education» more  CORR 2006»
15 years 4 months ago
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
The asymptotic iterative decoding performances of low-density parity-check (LDPC) codes using min-sum (MS) and sum-product (SP) decoding algorithms on memoryless binary-input outp...
Chun-Hao Hsu, Achilleas Anastasopoulos
PAAPP
2006
44views more  PAAPP 2006»
15 years 4 months ago
Revisiting communication code generation algorithms for message-passing systems
In this paper, we investigate algorithms for generating communication code to run on distributedmemory systems. We modify algorithms from previously published work and prove that ...
Clayton S. Ferner