Sciweavers

1031 search results - page 116 / 207
» codes 2004
Sort
View
NSDI
2004
15 years 2 months ago
MACEDON: Methodology for Automatically Creating, Evaluating, and Designing Overlay Networks
Currently, researchers designing and implementing largescale overlay services employ disparate techniques at each stage in the production cycle: design, implementation, experiment...
Adolfo Rodriguez, Charles Edwin Killian, Sooraj Bh...
90
Voted
USS
2004
15 years 2 months ago
Static Disassembly of Obfuscated Binaries
Disassembly is the process of recovering a symbolic representation of a program's machine code instructions from its binary representation. Recently, a number of techniques h...
Christopher Krügel, William K. Robertson, Fre...
IACR
2011
80views more  IACR 2011»
14 years 8 days ago
History-Free Sequential Aggregate Signatures
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion o...
Marc Fischlin, Anja Lehmann, Dominique Schröd...
ICIP
2004
IEEE
16 years 2 months ago
Analysis of the efficiency of snr-scalable strategies for motion compensated video coders
In this paper, an analysis of the efficiency of three signal-to-noise ratio (SNR) scalable strategies for motion compensated video coders and their non-scalable counterpart is pre...
Josep Prades-Nebot, Gregory W. Cook, Edward J. Del...
98
Voted
ICIP
2004
IEEE
16 years 2 months ago
H.264/AVC data partitioning for mobile video communication
In this work we compare non-scalable video coding with data partitioning using H.264/AVC under similar application and channel constraints for conversational applications over mob...
Thomas Stockhammer, Maja Bystrom