Sciweavers

2610 search results - page 74 / 522
» codes 2007
Sort
View
114
Voted
CSREASAM
2007
15 years 5 months ago
Software Protection by Hardware and Obfuscation
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote serv...
Bin Fu, Sai Aravalli, John Abraham
115
Voted
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 10 months ago
Analysis of Absorbing Sets for Array-Based LDPC Codes
— Low density parity check codes (LDPC) are known to perform very well under iterative decoding. However, these codes also exhibit a change in the slope of the bit error rate (BE...
Lara Dolecek, Zhengya Zhang, Venkat Anantharam, Ma...
DSN
2007
IEEE
15 years 10 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu
BIOSYSTEMS
2007
123views more  BIOSYSTEMS 2007»
15 years 3 months ago
Real time computation: Zooming in on population codes
Information processing in nervous systems intricately combines computation at the neuronal and network levels. Many computations may be envisioned as sequences of signal processin...
Olivier Rochel, Netta Cohen
125
Voted
ISNN
2007
Springer
15 years 9 months ago
Sparse Coding in Sparse Winner Networks
This paper investigates a mechanism for reliable generation of sparse code in a sparsely connected, hierarchical, learning memory. Activity reduction is accomplished with local com...
Janusz A. Starzyk, Yinyin Liu, David D. Vogel