Results 111 to 120 of about 338,774 (159)
Some of the next articles are maybe not open access.

Code obfuscation techniques for metamorphic viruses

Journal in Computer Virology, 2008
This paper deals with metamorphic viruses. More precisely, it examines the use of advanced code obfuscation techniques with respect to metamorphic viruses. Our objective is to evaluate the difficulty of a reliable static detection of viruses that use such obfuscation techniques. Here we extend Spinellis’ result (IEEE Trans. Inform.
Borello, J.-M., Mé, Ludovic
openaire   +2 more sources

Existing Code Optimization Techniques

2004
Several research groups in the area of software synthesis for (embedded) programmable processors have developed techniques supporting different aspects of important optimization problems. In this chapter, an overview and a classification of existing work is given.
Heiko Falk, Peter Marwedel
openaire   +1 more source

Video Coding —Techniques, Standards and Applications

BT Technology Journal, 1997
Virtually all teleconferencing systems incorporating video use compression algorithms to reduce the video data rate to manageable proportions. For a given bit rate, higher compression brings higher quality, although there can also be disadvantages, such as increased delay.
M W Whybray, G D Morrison, P J Mulroy
openaire   +1 more source

Coding Techniques for Failure- Tolerant Counters

IEEE Transactions on Computers, 1970
Summary: This paper delineates an application of two classes of parity-check codes to the design for failure-tolerant counters. They are 1) a modified first-order Reed-Muller code and 2) the perfect Hamming code. The first code employs a majority element for implementing the error-correcting scheme while the second one makes use of a variable \(2^{j-2}
Reed, I. S., Chiang, A. C. L.
openaire   +2 more sources

Advanced Coding and Coded Modulation Techniques

2017
This chapter is devoted to advanced channel coding and coded modulation techniques. After linear and BCH code fundamentals, we provide the trellis description of linear block codes and describe the corresponding Viterbi decoding algorithm. After describing the fundamentals of convolutional, RS, concatenated, and product codes, we describe coding with ...
openaire   +1 more source

Entropy and Coding Techniques

2002
A binary digit, or “bit,” b, takes one of the values b = 0 or b = 1. A single bit has the ability to convey a certain amount of information — the information corresponding to the outcome of a binary decision, or “event,” such as a coin toss. If we have N bits, then we can identify the outcomes of N binary decisions.
David S. Taubman, Michael W. Marcellin
openaire   +1 more source

Video based lifting technique coding system

Ergonomics, 1998
Despite automation and improved working conditions, many materials in industry are still handled manually. Among the basic activities involved in manual materials handling, lifting is the one most frequently associated with low-back pain (LBP). Biomechanical analysis techniques have been used to better understand the risk factors associated with manual
S M, Hsiang   +3 more
openaire   +2 more sources

The malicious code hiding techniques, code obfuscation problem

2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA), 2014
Nowadays, in world of modern technologies and technology society, information can be the most valuable commodity on the market and so gathering it, buy or sell it becomes the most important part of doing business. Because of the prizing, the more sophisticated ways of gathering and processing of the information are still being developed, various kinds ...
Jan Hurtuk   +3 more
openaire   +1 more source

New Coding Techniques for Codes over Gaussian Integers

IEEE Transactions on Communications, 2013
This work presents block codes over Gaussian integers. We introduce Gaussian integer rings which extend the number of possible signal constellations over Gaussian integer fields. Many well-known code constructions can be used for codes over Gaussian integer rings, e.g., the Plotkin construction or product codes.
J. Freudenberger   +2 more
openaire   +1 more source

Innovative date‐coding technique

Sensor Review, 2005
PurposeDescribes the properties and uses of a new colour‐change chemical for laser‐printing of human and machine‐readable data.Design/methodology/approachPresents the characteristics and modes of application of the chemical, its advantages over the current techniques of inkjet printing and laser‐marking, and a number of applications which show its ...
openaire   +1 more source

Home - About - Disclaimer - Privacy