Sciweavers

2610 search results - page 165 / 522
» codes 2007
Sort
View
131
Voted
SRDS
2007
IEEE
15 years 10 months ago
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization
Code injection attacks are a top threat to today’s Internet. With zero-day attacks on the rise, randomization techniques have been introduced to diversify software and operation...
Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wa...
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 4 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
134
Voted
SPEAKERC
2007
Springer
126views Biometrics» more  SPEAKERC 2007»
15 years 10 months ago
Frame Based Features
In this chapter we will discuss feature extraction methods for speaker classification. We introduce linear predictive coding, mel frequency cepstral coefficients and wavelets and ...
Stefan Schacht, Jacques C. Koreman, Christoph Laue...
P2P
2007
IEEE
161views Communications» more  P2P 2007»
15 years 10 months ago
The BitCod Client: A BitTorrent Clone using Network Coding
Network coding is an emerging field of research with sound and mature theory supporting it. Recent works shows that it has many benefits like improved fault tolerance, higher ...
Danny Bickson, Roy Borer
ICC
2007
IEEE
15 years 10 months ago
Optimal Distributed Multicast Routing using Network Coding
—Multicast is an important communication paradigm, also a problem well known for its difficulty (NP-completeness) to achieve certain optimization goals, such as minimum network ...
Yi Cui, Yuan Xue, Klara Nahrstedt