Sciweavers

1448 search results - page 55 / 290
» From Requirements to Code Revisited
Sort
View
TIFS
2008
102views more  TIFS 2008»
13 years 7 months ago
Insertion, Deletion Codes With Feature-Based Embedding: A New Paradigm for Watermark Synchronization With Applications to Speech
A framework is proposed for synchronization in feature-based data embedding systems that is tolerant of errors in estimated features. The method combines feature-based embedding wi...
David J. Coumou, Gaurav Sharma
ICSR
2009
Springer
13 years 5 months ago
Verifying Component-Based Software: Deep Mathematics or Simple Bookkeeping?
Anecdotal experience constructing proofs of correctness of code built from reusable software components reveals that they tend to be relatively trivial bookkeeping exercises: they ...
Jason Kirschenbaum, Bruce M. Adcock, Derek Bronish...
VTC
2008
IEEE
14 years 2 months ago
Construction of Regular Quasi-Cyclic Protograph LDPC codes based on Vandermonde Matrices
Abstract— In this contribution, we investigate the attainable performance of quasi-cyclic (QC) protograph Low-Density Parity-Check (LDPC) codes for transmission over both Additiv...
Nicholas Bonello, Sheng Chen, Lajos Hanzo
SBACPAD
2007
IEEE
143views Hardware» more  SBACPAD 2007»
14 years 2 months ago
A Code Compression Method to Cope with Security Hardware Overheads
Code Compression has been used to alleviate the memory requirements as well as to improve performance and/or minimize energy consumption. On the other hand, implementing security ...
Eduardo Wanderley Netto, Romain Vaslin, Guy Gognia...
ACSAC
2006
IEEE
14 years 1 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...