Results 111 to 120 of about 338,774 (159)
Some of the next articles are maybe not open access.
Code obfuscation techniques for metamorphic viruses
Journal in Computer Virology, 2008This paper deals with metamorphic viruses. More precisely, it examines the use of advanced code obfuscation techniques with respect to metamorphic viruses. Our objective is to evaluate the difficulty of a reliable static detection of viruses that use such obfuscation techniques. Here we extend Spinellis’ result (IEEE Trans. Inform.
Borello, J.-M., Mé, Ludovic
openaire +2 more sources
Existing Code Optimization Techniques
2004Several research groups in the area of software synthesis for (embedded) programmable processors have developed techniques supporting different aspects of important optimization problems. In this chapter, an overview and a classification of existing work is given.
Heiko Falk, Peter Marwedel
openaire +1 more source
Video Coding —Techniques, Standards and Applications
BT Technology Journal, 1997Virtually all teleconferencing systems incorporating video use compression algorithms to reduce the video data rate to manageable proportions. For a given bit rate, higher compression brings higher quality, although there can also be disadvantages, such as increased delay.
M W Whybray, G D Morrison, P J Mulroy
openaire +1 more source
Coding Techniques for Failure- Tolerant Counters
IEEE Transactions on Computers, 1970Summary: This paper delineates an application of two classes of parity-check codes to the design for failure-tolerant counters. They are 1) a modified first-order Reed-Muller code and 2) the perfect Hamming code. The first code employs a majority element for implementing the error-correcting scheme while the second one makes use of a variable \(2^{j-2}
Reed, I. S., Chiang, A. C. L.
openaire +2 more sources
Advanced Coding and Coded Modulation Techniques
2017This chapter is devoted to advanced channel coding and coded modulation techniques. After linear and BCH code fundamentals, we provide the trellis description of linear block codes and describe the corresponding Viterbi decoding algorithm. After describing the fundamentals of convolutional, RS, concatenated, and product codes, we describe coding with ...
openaire +1 more source
2002
A binary digit, or “bit,” b, takes one of the values b = 0 or b = 1. A single bit has the ability to convey a certain amount of information — the information corresponding to the outcome of a binary decision, or “event,” such as a coin toss. If we have N bits, then we can identify the outcomes of N binary decisions.
David S. Taubman, Michael W. Marcellin
openaire +1 more source
A binary digit, or “bit,” b, takes one of the values b = 0 or b = 1. A single bit has the ability to convey a certain amount of information — the information corresponding to the outcome of a binary decision, or “event,” such as a coin toss. If we have N bits, then we can identify the outcomes of N binary decisions.
David S. Taubman, Michael W. Marcellin
openaire +1 more source
Video based lifting technique coding system
Ergonomics, 1998Despite automation and improved working conditions, many materials in industry are still handled manually. Among the basic activities involved in manual materials handling, lifting is the one most frequently associated with low-back pain (LBP). Biomechanical analysis techniques have been used to better understand the risk factors associated with manual
S M, Hsiang +3 more
openaire +2 more sources
The malicious code hiding techniques, code obfuscation problem
2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA), 2014Nowadays, in world of modern technologies and technology society, information can be the most valuable commodity on the market and so gathering it, buy or sell it becomes the most important part of doing business. Because of the prizing, the more sophisticated ways of gathering and processing of the information are still being developed, various kinds ...
Jan Hurtuk +3 more
openaire +1 more source
New Coding Techniques for Codes over Gaussian Integers
IEEE Transactions on Communications, 2013This work presents block codes over Gaussian integers. We introduce Gaussian integer rings which extend the number of possible signal constellations over Gaussian integer fields. Many well-known code constructions can be used for codes over Gaussian integer rings, e.g., the Plotkin construction or product codes.
J. Freudenberger +2 more
openaire +1 more source
Innovative date‐coding technique
Sensor Review, 2005PurposeDescribes the properties and uses of a new colour‐change chemical for laser‐printing of human and machine‐readable data.Design/methodology/approachPresents the characteristics and modes of application of the chemical, its advantages over the current techniques of inkjet printing and laser‐marking, and a number of applications which show its ...
openaire +1 more source

