Sciweavers

2572 search results - page 78 / 515
» codes 2008
Sort
View
JSS
2008
94views more  JSS 2008»
15 years 3 months ago
Examining the significance of high-level programming features in source code author classification
The use of Source Code Author Profiles (SCAP) represents a new, highly accurate approach to source code authorship identification that is, unlike previous methods, language indepe...
Georgia Frantzeskou, Stephen G. MacDonell, Efstath...
122
Voted
TVLSI
2008
102views more  TVLSI 2008»
15 years 3 months ago
A Robust 4-PAM Signaling Scheme for Inter-Chip Links Using Coding in Space
Abstract--Increasing demand for high-speed inter-chip interconnects requires faster links that consume less power. Channel coding can be used to lower the required signal-to-noise ...
Kamran Farzan, David A. Johns
112
Voted
PST
2004
15 years 4 months ago
Detection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...
TIT
1998
55views more  TIT 1998»
15 years 3 months ago
On the Trellis Representation of the Delsarte-Goethals Codes
— In this correspondence, the trellis representation of the Kerdock and Delsarte–Goethals codes is addressed. It is shown that the states of a trellis representation of DG(m; ...
Yaron Shany, Ilan Reuven, Yair Be'ery
120
Voted
CORR
2008
Springer
115views Education» more  CORR 2008»
15 years 3 months ago
Coding over an Erasure Channel with a Large Alphabet Size
An erasure channel with a fixed alphabet size q, where q 1, is studied . It is proved that over any erasure channel (with or without memory), Maximum Distance Separable (MDS) codes...
Shervan Fashandi, Shahab Oveis Gharan, Amir K. Kha...