Sciweavers

2572 search results - page 195 / 515
» codes 2008
Sort
View
CCS
2008
ACM
15 years 6 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
SIGSOFT
2008
ACM
16 years 5 months ago
Doloto: code splitting for network-bound web 2.0 applications
Modern Web 2.0 applications, such as GMail, Live Maps, Facebook and many others, use a combination of Dynamic HTML, JavaScript and other Web browser technologies commonly referred...
V. Benjamin Livshits, Emre Kiciman
ISCAS
2008
IEEE
134views Hardware» more  ISCAS 2008»
15 years 11 months ago
Bidirectionally decodable Wyner-Ziv video coding
Abstract— Inter frame prediction technique significantly improves the compression efficiency in the hybrid video coding schemes. However, this technique causes the decoding dep...
Xiaopeng Fan, Oscar C. Au, Yan Chen, Jiantao Zhou,...
ICC
2008
IEEE
141views Communications» more  ICC 2008»
15 years 11 months ago
Multilevel Structured Low-Density Parity-Check Codes
— Low-Density Parity-Check (LDPC) codes are typically characterized by a relatively high-complexity description, since a considerable amount of memory is required in order to sto...
Nicholas Bonello, Sheng Chen, Lajos Hanzo
CORR
2008
Springer
74views Education» more  CORR 2008»
15 years 4 months ago
On mobile sets in the binary hypercube
If two distance-3 codes have the same neighborhood, then each of them is called a mobile set. In the (4k + 3)-dimensional binary hypercube, there exists a mobile set of cardinality...
Yuriy Vasil'ev, Sergey V. Avgustinovich, Denis S. ...