Sciweavers

2572 search results - page 59 / 515
» codes 2008
Sort
View
USS
2008
15 years 1 months ago
An Empirical Security Study of the Native Code in the JDK
It is well known that the use of native methods in Java defeats Java's guarantees of safety and security, which is why the default policy of Java applets, for example, does n...
Gang Tan, Jason Croft
DM
2007
103views more  DM 2007»
14 years 11 months ago
Codes from the line graphs of complete multipartite graphs and PD-sets
The binary codes of the line graphs Lm(n) of the complete multipartite graphs Kn1,...,nm (ni = n for 1 ≤ i ≤ m) n ≥ 2, m ≥ 3 are examined, and PD-sets and s-PD-sets are fo...
Jennifer D. Key, P. Seneviratne
DM
2002
104views more  DM 2002»
14 years 10 months ago
Graphs induced by Gray codes
We disprove a conjecture of Bultena and Ruskey [1], that all trees which are cyclic graphs of cyclic Gray codes have diameter 2 or 4, by producing codes whose cyclic graphs are tre...
Elizabeth L. Wilmer, Michael D. Ernst
49
Voted
ICIP
2008
IEEE
16 years 23 days ago
Rate control for video coding with slice type dependencies
Athanasios Leontaris, Alexis M. Tourapis