Sciweavers

2081 search results - page 36 / 417
» codes 2006
Sort
View
IWPC
2006
IEEE
15 years 9 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere
COMBINATORICS
1998
130views more  COMBINATORICS 1998»
15 years 3 months ago
Codes and Projective Multisets
The paper gives a matrix-free presentation of the correspondence between full-length linear codes and projective multisets. It generalizes the BrouwerVan Eupen construction that t...
Stefan M. Dodunekov, Juriaan Simonis
INFSOF
2002
78views more  INFSOF 2002»
15 years 3 months ago
Flow insensitive points-to sets
Pointer analysis is an important part of source code analysis. Many programs that manipulate source code take points-to sets as part of their input. Points-to related data collect...
Paul Anderson, David Binkley, Genevieve Rosay, Tim...
IJON
2002
99views more  IJON 2002»
15 years 3 months ago
Asymptotic behaviors of population codes
The present study investigates asymptotic behaviors of population codes, i.e., their performances when the number of neurons goes to in
Si Wu, Shun-ichi Amari, Hiroyuki Nakahara
JSAC
2006
63views more  JSAC 2006»
15 years 3 months ago
Generalized pairwise complementary codes with set-wise uniform interference-free windows
Abstract--This paper introduces an approach to generate generalized pairwise complementary (GPC) codes, which offer a uniform interference free windows (IFWs) across the entire cod...
Hsiao-Hwa Chen, Yu-Ching Yeh, Xi Zhang, Aiping Hua...