Sciweavers

64 search results - page 7 / 13
» Learning to Analyze Binary Computer Code
Sort
View
DASIP
2010
13 years 2 months ago
RVC-CAL dataflow implementations of MPEG AVC/H.264 CABAC decoding
This paper describes the implementation of the MPEG AVC CABAC entropy decoder using the RVC-CAL dataflow programming language. CABAC is the Context based Adaptive Binary Arithmeti...
Endri Bezati, Marco Mattavelli, Mickaël Raule...
CVPR
2012
IEEE
11 years 10 months ago
Icon scanning: Towards next generation QR codes
Undoubtedly, a key feature in the popularity of smartmobile devices is the numerous applications one can install. Frequently, we learn about an application we desire by seeing it ...
Itamar Friedman, Lihi Zelnik-Manor
CRYPTO
1995
Springer
135views Cryptology» more  CRYPTO 1995»
13 years 11 months ago
Committed Oblivious Transfer and Private Multi-Party Computation
Abstract. In this paper we present an eficient protocol for “Committed Oblivious Transfer” to perform oblivious transfer on committed bits: suppose Alice is committed to bits 0...
Claude Crépeau, Jeroen van de Graaf, Alain ...
IPPS
2000
IEEE
14 years 15 hour ago
Applying Interposition Techniques for Performance Analysis of OpenMP Parallel Applications
Tuning parallel applications requires the use of effective tools for detecting performance bottlenecks. Along a parallel program execution, many individual situations of performan...
Marc González, Albert Serra, Xavier Martore...
WCRE
2010
IEEE
13 years 6 months ago
Computer-Aided Extraction of Software Components
—In a software project, outsourcing the development of a particular functionality, reusing a part in another software, or handing-over a part of the code to a new team member req...
Andreas Marx, Fabian Beck, Stephan Diehl