Sciweavers

2499 search results - page 164 / 500
» The Serializability of Network Codes
Sort
View
ACSAC
2007
IEEE
15 years 10 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski
ICC
2007
IEEE
15 years 10 months ago
Cooperative Concatenated Coding for Wireless Systems
– Cooperative transmission has been of growing interest recently where users take advantage of each other’s resources for better overall performance. In this paper, coded coope...
Ernest S. Lo, Khaled Ben Letaief
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....
141
Voted
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Evaluation of the Interleaved Source Coding (ISC) Under Packet Correlation
Network impairments such as delay and packet losses have severe impact on the presentation quality of many predictive video sources. Prior researches (e.g., [1]-[3][5]-[9][11]-[13...
Jin Young Lee, Hayder Radha
GLOBECOM
2009
IEEE
15 years 8 months ago
Experimental Validation of Periodic Codes for PON Monitoring
In this paper we investigate both experimentally and via simulation the monitoring of fiber link quality in a PON using optical coding technology. We use a new, simple and costeffe...
Mohammad M. Rad, Habib Fathallah, Sophie LaRochell...