Sciweavers

4764 search results - page 37 / 953
» Applications of Error-Control Coding
Sort
View
ISCAS
2002
IEEE
65views Hardware» more  ISCAS 2002»
14 years 21 days ago
Maximum achievable energy reduction using coding with applications to deep sub-micron buses
: In this work, the problem of the computation of the minimum energy per bit required for communicating through deep sub-micron buses at a given bit rate is solved with an explicit...
Paul-Peter Sotiriadis, Anantha Chandrakasan, Vahid...
WWW
2004
ACM
14 years 8 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
DAIS
2006
13 years 9 months ago
A Code Migration Framework for AJAX Applications
AJAX (Asynchronous JavaScript and XML) defines a new paradigm for writing highly interactive web applications. Prominent web sites such as Google Maps have made AJAX popular. Writi...
Arno Puder
DSN
2002
IEEE
14 years 22 days ago
32-Bit Cyclic Redundancy Codes for Internet Applications
Standardized 32-bit Cyclic Redundancy Codes provide fewer bits of guaranteed error detection than they could, achieving a Hamming Distance (HD) of only 4 for maximum-length Ethern...
Philip Koopman