Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
What is the maximum possible number, f3(n), of vectors of length n over {0, 1, 2} such that the Hamming distance between every two is even? What is the maximum possible number, g3...
— A class of rate-one space-time block codes (STBC) allowing the decoding of transmitted symbols into four groups is recently proposed by Yuen, Guan and Tjhung. This code is call...
The multi-view video coding improves the coding efficiency by utilizing motion-compensated prediction (MCP) and disparity-compensated prediction (DCP). However, the complexity of ...
Xiaoming Li, Debin Zhao, Xiangyang Ji, Qiang Wang,...
— A streaming system based on the Scalable Video Coding (SVC) extension of H.264/AVC is shown. SVC allows for data rate adaptation without re-encoding just by dropping packets of...
Thomas Schierl, Cornelius Hellge, Shpend Mirta, Ka...