Results 31 to 40 of about 245,521 (284)

Generating reversible circuits from higher-order functional programs

open access: yes, 2016
Boolean reversible circuits are boolean circuits made of reversible elementary gates. Despite their constrained form, they can simulate any boolean function.
A Ambainis   +15 more
core   +3 more sources

Group LCD and group reversible LCD codes

open access: yesFinite Fields and Their Applications, 2022
In this paper, we give a new method for constructing LCD codes. We employ group rings and a well known map that sends group ring elements to a subring of the $n \times n$ matrices to obtain LCD codes. Our construction method guarantees that our LCD codes are also group codes, namely, the codes are ideals in a group ring.
Steven T. Dougherty   +3 more
openaire   +4 more sources

Studying Acetylation of Aconitase Isozymes by Genetic Code Expansion

open access: yesFrontiers in Chemistry, 2022
Aconitase catalyzes the second reaction of the tricarboxylic acid cycle, the reversible conversion of citrate and isocitrate. Escherichia coli has two isoforms of aconitase, AcnA and AcnB. Acetylomic studies have identified acetylation at multiple lysine
Jessica Araujo   +5 more
doaj   +1 more source

Elasticity sampling links thermodynamics to metabolic control

open access: yes, 2013
Metabolic networks can be turned into kinetic models in a predefined steady state by sampling the reaction elasticities in this state. Elasticities for many reversible rate laws can be computed from the reaction Gibbs free energies, which are determined ...
Liebermeister, Wolfram
core   +2 more sources

Indeterminate-length quantum coding [PDF]

open access: yes, 2000
The quantum analogues of classical variable-length codes are indeterminate-length quantum codes, in which codewords may exist in superpositions of different lengths. This paper explores some of their properties.
A. R. Calderbank   +18 more
core   +2 more sources

Reversible codes

open access: yesInformation and Control, 1964
A code is defined to be reversible if its code-word set is invariant under a reversal of the digits in each code word. Such codes may have application in certain data storage and retrieval systems. It is shown that cyclic codes and convolutional codes are reversible when and only when their code-generating polynomials are self-reciprocal.
openaire   +1 more source

Deobfuscation: Reverse Engineering Obfuscated Code [PDF]

open access: yes12th Working Conference on Reverse Engineering (WCRE'05), 2006
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner workings of proprietary software systems. This paper examines techniques for automatic deobfuscation of obfuscated programs, as a step towards reverse engineering such programs. Our
S.K. Udupa, S.K. Debray, M. Madou
openaire   +1 more source

Reversible Codes in Matn×s(Fq) Under NRT-Metric

open access: yesIEEE Access
Reversible codes play an essential role in coding theory because of their structural symmetry and broad applications in error control, cryptography, and DNA computing.
Bodigiri Sai Gopinadh, Venkatrajam Marka
doaj   +1 more source

Two-Layer Reversible Data Hiding Based on AMBTC Image With (7, 4) Hamming Code

open access: yesIEEE Access, 2020
In Malik et al.'s method, each pixel can be embedded with log23 bits by being modified at most 1. Thus, their method achieves significant hiding capacity while maintaining good visual quality. However, in their method, the first lower and the first upper
Juan Lin   +4 more
doaj   +1 more source

Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection

open access: yesEntropy, 2021
With the development of cloud storage and privacy protection, reversible data hiding in encrypted images (RDHEI) plays the dual role of privacy protection and secret information transmission. RDHEI has a good application prospect and practical value. The
Lin Li, Chin-Chen Chang, Chia-Chen Lin
doaj   +1 more source

Home - About - Disclaimer - Privacy