Sciweavers

2081 search results - page 36 / 417
» codes 2006
Sort
View
78
Voted
IWPC
2006
IEEE
15 years 4 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere
COMBINATORICS
1998
130views more  COMBINATORICS 1998»
14 years 10 months ago
Codes and Projective Multisets
The paper gives a matrix-free presentation of the correspondence between full-length linear codes and projective multisets. It generalizes the BrouwerVan Eupen construction that t...
Stefan M. Dodunekov, Juriaan Simonis
72
Voted
INFSOF
2002
78views more  INFSOF 2002»
14 years 10 months ago
Flow insensitive points-to sets
Pointer analysis is an important part of source code analysis. Many programs that manipulate source code take points-to sets as part of their input. Points-to related data collect...
Paul Anderson, David Binkley, Genevieve Rosay, Tim...
IJON
2002
99views more  IJON 2002»
14 years 10 months ago
Asymptotic behaviors of population codes
The present study investigates asymptotic behaviors of population codes, i.e., their performances when the number of neurons goes to in
Si Wu, Shun-ichi Amari, Hiroyuki Nakahara
JSAC
2006
63views more  JSAC 2006»
14 years 10 months ago
Generalized pairwise complementary codes with set-wise uniform interference-free windows
Abstract--This paper introduces an approach to generate generalized pairwise complementary (GPC) codes, which offer a uniform interference free windows (IFWs) across the entire cod...
Hsiao-Hwa Chen, Yu-Ching Yeh, Xi Zhang, Aiping Hua...