Results 31 to 40 of about 246,608 (282)

Deobfuscation: Reverse Engineering Obfuscated Code [PDF]

open access: yes12th Working Conference on Reverse Engineering (WCRE'05), 2006
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner workings of proprietary software systems. This paper examines techniques for automatic deobfuscation of obfuscated programs, as a step towards reverse engineering such programs. Our
S.K. Udupa, S.K. Debray, M. Madou
openaire   +1 more source

Reversible Codes in Matn×s(Fq) Under NRT-Metric

open access: yesIEEE Access
Reversible codes play an essential role in coding theory because of their structural symmetry and broad applications in error control, cryptography, and DNA computing.
Bodigiri Sai Gopinadh, Venkatrajam Marka
doaj   +1 more source

On Reversibility and Self-Duality for Some Classes of Quasi-Cyclic Codes

open access: yesIEEE Access, 2020
In this work, we study two classes of quasi-cyclic (QC) codes and examine how several properties can be combined into the codes of these classes. We start with the class of QC codes generated by diagonal generator polynomial matrices; a QC code in this ...
Ramy Taki Eldin, Hajime Matsui
doaj   +1 more source

Experimental results for the Poincar\'e center problem (including an Appendix with Martin Cremer)

open access: yes, 2005
We apply a heuristic method based on counting points over finite fields to the Poincar\'e center problem. We show that this method gives the correct results for homogeneous non linearities of degree 2 and 3.
Bothmer, Hans-Christian Graf v.
core   +1 more source

On the origin of the mitochondrial genetic code: Towards a unified mathematical framework for the management of genetic information [PDF]

open access: yes, 2012
The origin of the genetic code represents one of the most challenging problems in molecular evolution. The genetic code is an important universal feature of extant organisms and indicates a common ancestry of different forms of life on earth.
Diego Luis Gonzalez   +2 more
core   +2 more sources

PERSYMMETRIC MATRIX AND ITS APPLICATION IN CODING THEORY

open access: yesBarekeng
A persymmetric matrix is a square matrix that is symmetric concerning its antidiagonal. This article discusses some characteristics of a persymmetric matrix and its application in coding theory. A persymmetric matrix is used to form a generator matrix of
Ardi Nur Hidayat   +2 more
doaj   +1 more source

Studying Acetylation of Aconitase Isozymes by Genetic Code Expansion

open access: yesFrontiers in Chemistry, 2022
Aconitase catalyzes the second reaction of the tricarboxylic acid cycle, the reversible conversion of citrate and isocitrate. Escherichia coli has two isoforms of aconitase, AcnA and AcnB. Acetylomic studies have identified acetylation at multiple lysine
Jessica Araujo   +5 more
doaj   +1 more source

A NOVEL REVERSIBLE FAULT TOLERANT MICROPROCESSOR DESIGN IN AMS 0.35UM PROCESS

open access: yesElectrica, 2019
In this study, reversible circuits are revisited to achieve extreme soft-defect awareness in classical CMOS circuits. Defect models in the literature are reviewed and defect scattering is analyzed.
M. Hüsrev CILASUN, Mustafa ALTUN
doaj   +2 more sources

Two-Layer Reversible Data Hiding Based on AMBTC Image With (7, 4) Hamming Code

open access: yesIEEE Access, 2020
In Malik et al.'s method, each pixel can be embedded with log23 bits by being modified at most 1. Thus, their method achieves significant hiding capacity while maintaining good visual quality. However, in their method, the first lower and the first upper
Juan Lin   +4 more
doaj   +1 more source

Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection

open access: yesEntropy, 2021
With the development of cloud storage and privacy protection, reversible data hiding in encrypted images (RDHEI) plays the dual role of privacy protection and secret information transmission. RDHEI has a good application prospect and practical value. The
Lin Li, Chin-Chen Chang, Chia-Chen Lin
doaj   +1 more source

Home - About - Disclaimer - Privacy