Results 241 to 250 of about 108,516 (281)
Some of the next articles are maybe not open access.
Reverse concatenated watermark codes
2012 IEEE International Conference on Communications (ICC), 2012In this paper, we introduce an error correction coding scheme, known as reverse concatenated watermark codes for substitution, insertion and deletion channel. This code is obtained by concatenating a distribution transformer with an LDPC code.
Rathnakumar Radhakrishnan, Kui Cai
openaire +1 more source
Reverse Engineering a Code without the Code
Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium, 2017Retrieving assets from inside a secure element should be difficult. While the most attractive assets are the cryptographic keys stored in the Non Volatile Memory (NVM) area, the algorithms which are executed are also of interest. This means that the confidentiality of binary code embedded in the Read Only Memory (ROM) of that device should also be ...
Abdelhak Mesbah +2 more
openaire +3 more sources
Reversible Codes and Applications to DNA
2014In this study we focus on codes over a special family of commutative rings where we are able to construct a map that gives a correspondence between k-bases (k-letter words) of DNA with elements of the ring. By making use of so called coterm polynomials, we are able to solve the reversibility and complement problems in DNA codes and construct DNA codes ...
Elif Segah Oztas +2 more
openaire +2 more sources
Reversible subband coding of images
Systems and Computers in Japan, 1995AbstractIn conventional 1D filter banks used for reversible subband coding of gray‐level still images, the high‐band signals are extrapolative or interpolative prediction error signals, the former using one side of the pixels alone and the latter using two sides of the pixels but with levels four times that of the input signals.This paper proposes a ...
Kunitoshi Komatsu +2 more
openaire +1 more source
Construction of reversible self-dual codes
Finite Fields and Their Applications, 2020zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hyun Jin Kim 0002 +2 more
openaire +1 more source
Reverse Multi-Delimiter Compression Codes
2020 Data Compression Conference (DCC), 2020An enhanced version of a recently introduced family of variable length binary codes with multiple pattern delimiters is presented and discussed. These codes are complete, universal, synchronizable, they have monotonic indexing and allow a standard search in compressed files.
Igor O. Zavadskyi, Anatoly V. Anisimov
openaire +1 more source
Rigorous code review by reverse engineering
Information and Software Technology, 2021Abstract Context: Agile software development methods advocate the importance of producing working software without comprehensive documentation. While this approach seems to suit the evolutionary nature of realistic software development for many applications, even including safety-critical systems, it faces two major challenges.
Shaoying Liu +5 more
openaire +1 more source
Forward and reverse coding for bacteria nanonetworks
2013 First International Black Sea Conference on Communications and Networking (BlackSeaCom), 2013In this paper we present a simple coding scheme for communication between nanomachines that utilizes bacteria as information carriers. In particular, we utilize two main properties of bacteria to facilitate communication, which includes their ability to swim within the medium, as well as the mechanism to transfer information between each other through ...
Vitaly Petrov +3 more
openaire +1 more source
Reverse engineering of legacy code exposed
Proceedings of the 17th international conference on Software engineering - ICSE '95, 1995Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is very costly to "understand" legacy code sufficiently well to permit changes to be made safely, because reverse engineering of legacy code is intractable in the usual ...
Bruce W. Weide +2 more
openaire +1 more source
Reversibility and efficiency in coding protein information
Journal of Theoretical Biology, 2010Why the genetic code has a fixed length? Protein information is transferred by coding each amino acid using codons whose length equals 3 for all amino acids. Hence the most probable and the least probable amino acid get a codeword with an equal length.
Tamir, Boaz, Priel, Avner
openaire +3 more sources

