In this paper, an educational software aimed to help learning Information Theory basics in a practical way is reported. The software, called IT-tutor-UV, can produce entropy analy...
Scalable similarity search is the core of many large scale learning or data mining applications. Recently, many research results demonstrate that one promising approach is creatin...
—The effectiveness of application-layer coding in a system with a large number of users is considered. The end users encode data packets before transmitting them. The effect of a...
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
Abstract— This paper proposes distance-enhancing constrained codes for optical recording channels. The repeated minimum transition runlength (RMTR) constraints are first investi...