Sciweavers

1629 search results - page 43 / 326
» Infeasible Code Detection
Sort
View
TIT
1998
70views more  TIT 1998»
13 years 9 months ago
Reduced-Redundancy Product Codes for Burst Error Correction
In a typical burst-error correction application of a product code of nv nh arrays, one uses an [nh; nh rh] code Ch that detects corrupted rows, and an [nv; nv rv] code Cv that is...
Ron M. Roth, Gadiel Seroussi
ACSAC
2001
IEEE
14 years 1 months ago
Application Intrusion Detection using Language Library Calls
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. In this paper we explore the possibility of detecting intrusion at the application...
Anita K. Jones, Yu Lin
GLOBECOM
2009
IEEE
14 years 2 months ago
Experimental Validation of Periodic Codes for PON Monitoring
In this paper we investigate both experimentally and via simulation the monitoring of fiber link quality in a PON using optical coding technology. We use a new, simple and costeffe...
Mohammad M. Rad, Habib Fathallah, Sophie LaRochell...
ICIP
2005
IEEE
14 years 11 months ago
An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking
Dirty paper trellis codes are a form of watermarking with side information. These codes have the advantage of being invariant to valumetric scaling of the cover Work. However, the...
Gwenaël J. Doërr, Ingemar J. Cox, Lin Li...
MSR
2009
ACM
14 years 4 months ago
Code siblings: Technical and legal implications of copying code between applications
Source code cloning does not happen within a single system only. It can also occur between one system and another. We use the term code sibling to refer to a code clone that evolv...
Daniel M. Germán, Massimiliano Di Penta, Ya...