Sciweavers

1953 search results - page 54 / 391
» codes 2010
Sort
View
105
Voted
MOBILIGHT
2010
15 years 16 days ago
Spectral Efficiency Using Combinations of Transmit Antenna Selection with Linear Dispersion Code Selection
In this paper the objective is to enhance the spectral efficiency using combinations of transmit antenna selection with Linear Dispersion Code Selection. Both bit error rate minimi...
Ismael Gutiérrez, Faouzi Bader
140
Voted
DIMVA
2010
15 years 2 months ago
dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection
Abstract. In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operatin...
Matthias Neugschwandtner, Christian Platzer, Paolo...
110
Voted
DRR
2010
15 years 3 months ago
Detecting modifications in paper documents: a coding approach
This paper presents an algorithm called CIPDEC (Content Integrity of Printed Documents using Error Correction), which identifies any modifications made to a printed document. CIPD...
Yogesh Sankarasubramaniam, Badri Narayanan, Kapali...
122
Voted
ENTCS
2002
79views more  ENTCS 2002»
15 years 2 months ago
Debugging and Testing Optimizers through Comparison Checking
We present a novel technique called comparison checking that helps optimizer writers debug optimizers by testing, for given inputs, that the semantics of a program are not changed...
Clara Jaramillo, Rajiv Gupta, Mary Lou Soffa
DCC
2010
IEEE
15 years 2 months ago
A tight asymptotic bound on the size of constant-weight conflict-avoiding codes
In the study of multiple-access in the collision channel, conflict-avoiding code is used to guarantee that each transmitting user can send at least one packet successfully in the w...
Kenneth W. Shum, Wing Shing Wong