Sciweavers

1953 search results - page 57 / 391
» codes 2010
Sort
View
117
Voted
DIMVA
2010
15 years 5 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
TCSV
2010
14 years 10 months ago
Improved CAVLC for H.264/AVC Lossless Intra-Coding
Context-based adaptive variable length coding (CAVLC) for the H.264/advanced video coding (AVC) standard was originally designed for lossy video coding, and as such does not yield ...
Jin Heo, Seung Hwan Kim, Yo-Sung Ho
112
Voted
DATESO
2010
286views Database» more  DATESO 2010»
15 years 2 months ago
Fast Fibonacci Encoding Algorithm
Abstract. Data compression has been widely applied in many data processing areas. Compression methods use variable-length codes with the shorter codes assigned to symbols or groups...
Jirí Walder, Michal Krátký, J...
TIT
2010
103views Education» more  TIT 2010»
14 years 10 months ago
Knuth's balanced codes revisited
Abstract--In 1986, Don Knuth published a very simple algorithm for constructing sets of bipolar codewords with equal numbers of "1"s and "01"s, called balanced ...
Jos H. Weber, Kees A. Schouhamer Immink
CORR
2010
Springer
183views Education» more  CORR 2010»
15 years 4 months ago
On the Energy Efficiency of LT Codes in Proactive Wireless Sensor Networks
This paper presents the first analysis on the energy efficiency of LT codes with Non-Coherent M-ary Frequency Shift Keying (NCMFSK), known as green modulation [1], in a proactive W...
Jamshid Abouei, J. David Brown, Konstantinos N. Pl...