Sciweavers

2610 search results - page 20 / 522
» codes 2007
Sort
View
72
Voted
VTC
2007
IEEE
125views Communications» more  VTC 2007»
15 years 3 months ago
Joint Source Coding, Unity Rate Precoding and FFH-MFSK Modulation Using Iteratively Decoded Irregular Variable Length Coding
— Serially concatenated and iteratively decoded Irregular Variable Length Coding (IrVLC) combined with precoded Fast Frequency Hopping (FFH) M-ary Frequency Shift Keying (MFSK) i...
Sohail Ahmed, Robert G. Maunder, Lie-Liang Yang, S...
CATS
2006
14 years 10 months ago
A Polynomial Algorithm for Codes Based on Directed Graphs
A complete description and proof of correctness are given for a new polynomial time algorithm for a class of codes based on directed graphs and involving construction well known i...
A. V. Kelarev
ICMCS
2007
IEEE
130views Multimedia» more  ICMCS 2007»
15 years 3 months ago
Wyner-Ziv Video Coding Based on Turbo Codes Exploiting Perfect Knowledge of Parity Bits
In a Wyner-Ziv video coding system based on turbo codes, parity bits are generated for a Wyner-Ziv frame and transmitted to the decoder. In this context of distributed source codi...
Hu Chen, Eckehard G. Steinbach
72
Voted
DIMVA
2009
14 years 10 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono
DAGSTUHL
2006
14 years 10 months ago
Clone Detector Use Questions: A List of Desirable Empirical Studies
Abstract. Code "clones" are similar segments of code that are frequently introduced by "scavenging" existing code, that is, reusing code by copying it and adapt...
Thomas R. Dean, Massimiliano Di Penta, Kostas Kont...