Sciweavers

1629 search results - page 122 / 326
» Infeasible Code Detection
Sort
View
TCOM
2010
145views more  TCOM 2010»
15 years 1 months ago
Blind Cooperative Diversity Using Distributed Space-Time Coding in Block Fading Channels
— Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. In this paper, we consider a scheme in whic...
Kamel Tourki, Mohamed-Slim Alouini, Luc Deneire
134
Voted
ACSAC
2004
IEEE
15 years 6 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
135
Voted
SIBGRAPI
2003
IEEE
15 years 8 months ago
Secure Authentication Watermarking for Binary Images
Abstract. Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authen...
Hae Yong Kim, Amir Afif
103
Voted
TASLP
2002
65views more  TASLP 2002»
15 years 2 months ago
Low-bitrate distributed speech recognition for packet-based and wireless communication
In this paper, we present a framework for developing source coding, channel coding and decoding as well as erasure concealment techniques adapted for distributed (wireless or packe...
A. Bernard, Abeer Alwan
139
Voted
TWC
2010
14 years 9 months ago
A Novel Graph-Based Suboptimal Multiuser Detector for FDM-CPM Transmissions
We consider a frequency division multiplexed (FDM) system where each user employs a continuous phase modulation (CPM), serially concatenated with an outer code through an interleav...
Amina Piemontese, Giulio Colavolpe