Sciweavers

1031 search results - page 116 / 207
» codes 2004
Sort
View
63
Voted
NSDI
2004
15 years 9 days ago
MACEDON: Methodology for Automatically Creating, Evaluating, and Designing Overlay Networks
Currently, researchers designing and implementing largescale overlay services employ disparate techniques at each stage in the production cycle: design, implementation, experiment...
Adolfo Rodriguez, Charles Edwin Killian, Sooraj Bh...
79
Voted
USS
2004
15 years 9 days ago
Static Disassembly of Obfuscated Binaries
Disassembly is the process of recovering a symbolic representation of a program's machine code instructions from its binary representation. Recently, a number of techniques h...
Christopher Krügel, William K. Robertson, Fre...
100
Voted
IACR
2011
80views more  IACR 2011»
13 years 10 months ago
History-Free Sequential Aggregate Signatures
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion o...
Marc Fischlin, Anja Lehmann, Dominique Schröd...
91
Voted
ICIP
2004
IEEE
16 years 16 days ago
Analysis of the efficiency of snr-scalable strategies for motion compensated video coders
In this paper, an analysis of the efficiency of three signal-to-noise ratio (SNR) scalable strategies for motion compensated video coders and their non-scalable counterpart is pre...
Josep Prades-Nebot, Gregory W. Cook, Edward J. Del...
78
Voted
ICIP
2004
IEEE
16 years 16 days ago
H.264/AVC data partitioning for mobile video communication
In this work we compare non-scalable video coding with data partitioning using H.264/AVC under similar application and channel constraints for conversational applications over mob...
Thomas Stockhammer, Maja Bystrom