Search results for "code"

showing 10 items of 1180 documents

From Erasure to Recognition (and Back Again?)

2015

CommunicationFlemish Sign LanguageManually coded languagebusiness.industrylanguageSociolinguistics of sign languagesErasureSign languagePsychologybusinesslanguage.human_languageLinguistics
researchProduct

New super-orthogonal space-time trellis codes using differential M-PSK for noncoherent mobile communication systems with two transmit antennas

2010

Published version of an article in the journal: Annals of Telecommunications-Annales Des Telecommunications. Also available from the publisher at: http://dx.doi.org/10.1007/s12243-010-0191-1 In this paper, we develop super-orthogonal space-time trellis codes (SOSTTCs) using differential binary phase-shift keying, quadriphase-shift keying and eight-phase shift keying for noncoherent communication systems with two transmit antennas without channel state information at the receiver. Based on a differential encoding scheme proposed by Tarokh and Jafarkhani, we propose a new decoding algorithm with reduced decoding complexity. To evaluate the performance of the SOSTTCs by way of computer simulat…

Computational complexity theoryComputer scienceList decodingKeyingVDP::Technology: 500::Information and communication technology: 550Sequential decodingData_CODINGANDINFORMATIONTHEORYChannel state informationElectronic engineeringElectrical and Electronic Engineeringdifferential detection noncoherent communications super-orthogonal space-time trellies codesAlgorithmDifferential codingDecoding methodsComputer Science::Information TheoryPhase-shift keying
researchProduct

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct

Gray visiting Motzkins

2002

We present the first Gray code for Motzkin words and their generalizations: k colored Motzkin words and Schroder words. The construction of these Gray codes is based on the observation that a k colored Motzkin word is the shuffle of a Dyck word by a k-ary variation on a trajectory which is a combination. In the final part of the paper we give some algorithmic considerations and other possible applications of the techniques introduced here.

Computer Networks and CommunicationsGeneralizationComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONCombinatoricsGray codeColoredAlgorithmicsMotzkin numberCode (cryptography)ArithmeticGray (horse)SoftwareWord (group theory)Information SystemsMathematicsActa Informatica
researchProduct

Cloud-based elastic architecture for distributed video encoding: Evaluating H.265, VP9, and AV1

2020

Abstract Areas with social and business impact such as entertainment, healthcare, surveillance, and e-learning would benefit from improvements in video coding and transcoding services. New codecs, such as AV1, are being developed to deal with new demands for high video resolutions with bandwidth constraints and quality requirements. However, these new codecs have high computational requirements and new strategies are needed to accelerate their processing. Cloud computing offers interesting features such as on-demand resource allocation, multitenancy, elasticity, and resiliency among others. Deploying video coding and transcoding services on these infrastructures is suitable because it allow…

Computer Networks and Communicationsbusiness.industryComputer scienceDistributed computing020206 networking & telecommunicationsCloud computing02 engineering and technologyTranscodingcomputer.software_genreComputer Science ApplicationsHardware and ArchitectureVideo encodingServerScalability0202 electrical engineering electronic engineering information engineeringCodec020201 artificial intelligence & image processingbusinessEncodercomputerJournal of Network and Computer Applications
researchProduct

SAUCE: A web application for interactive teaching and learning of parallel programming

2017

Abstract Prevalent hardware trends towards parallel architectures and algorithms create a growing demand for graduate students familiar with the programming of concurrent software. However, learning parallel programming is challenging due to complex communication and memory access patterns as well as the avoidance of common pitfalls such as dead-locks and race conditions. Hence, the learning process has to be supported by adequate software solutions in order to enable future computer scientists and engineers to write robust and efficient code. This paper discusses a selection of well-known parallel algorithms based on C++11 threads, OpenMP, MPI, and CUDA that can be interactively embedded i…

Computer Networks and Communicationsbusiness.industryComputer scienceProgramming languageWhite-box testingParallel algorithmProcess (computing)020206 networking & telecommunications02 engineering and technologyParallel computingThread (computing)computer.software_genreTheoretical Computer ScienceCUDASoftwareArtificial IntelligenceHardware and Architecture0202 electrical engineering electronic engineering information engineeringCode (cryptography)Web application020201 artificial intelligence & image processingbusinesscomputerSoftwareJournal of Parallel and Distributed Computing
researchProduct

Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches

2010

With the popularity of the IEEE 802.11 standards, many analytical saturation throughput studies for the distributed coordination function (DCF) have been reported. In this paper, we outline a number of issues and criticalities raised by previously proposed models. In particular, a careful look at backoff counter decrement rules allows us to conclude that, under saturation conditions, the slot immediately following a successful transmission can be accessed only by the station (STA) that has successfully transmitted in the previous channel access. Moreover, due to the specific acknowledgment (ACK) timeout setting adopted in the standard, the slot immediately following a collision cannot be ac…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceAerospace EngineeringThroughputDistributed coordination functionIEEE 802.11Wireless lanWireless Application ProtocolElectrical and Electronic Engineeringbusiness.industrySettore ING-INF/03 - Telecomunicazioni802.11 Performance analysisWiFiPerformance analysisComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCode ratemedium access protocolsAutomotive EngineeringbusinessTimeoutcomputerWireless sensor network802.11Computer networkCommunication channel
researchProduct

Pragmatic languages with universal grammars

2012

Abstract This paper constructs the equilibrium for a specific code that can be seen as a “universal grammar” in a class of common interest Sender–Receiver games where players communicate through a noisy channel. We propose a Senderʼs signaling strategy which does not depend on either the game payoffs or the initial probability distribution. The Receiverʼs strategy partitions the set of possible sequences into subsets, with a single action assignment to each of them. The Senderʼs signaling strategy is a Nash equilibrium, i.e. when the Receiver responds best to the Senderʼs strategy, the Sender has no incentive to deviate. An example shows that a tie-breaking decoding is crucial for the block…

Computer Science::Computer Science and Game TheoryEconomics and EconometricsTheoretical computer sciencejel:C61jel:D82Symmetric gamejel:C73TheoryofComputation_GENERALgrammar pragmatic language prototypes separating equilibriasymbols.namesakeNash equilibriumsymbolsCode (cryptography)Probability distributionCommunication sourceSignaling gameSet (psychology)FinanceDecoding methodsComputer Science::Information TheoryMathematicsGames and Economic Behavior
researchProduct

A GPU-Based DVC to H.264/AVC Transcoder

2010

Mobile to mobile video conferencing is one of the services that the newest mobile network operators can offer to users With the apparition of the distributed video coding paradigm which moves the majority of complexity from the encoder to the decoder, this offering can be achieved by introducing a transcoder This device has to convert from the distributed video coding paradigm to traditional video coding such as H.264/AVC which is formed by simpler decoders and more complex encoders, and allows to the users to execute only the low complex algorithms In order to deal with this high complex video transcoder, this paper introduces a graphics processing unit based transcoder as base station The…

Computer architectureComputer scienceVideo trackingReal-time computingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONData_CODINGANDINFORMATIONTHEORYVideo processingMultiview Video CodingCoding tree unitEncoderContext-adaptive binary arithmetic codingScalable Video CodingVideo compression picture types
researchProduct

Enriqueciendo la investigación en humanidades digitales. Análisis de textos de claustros académicos de la Universidad de Valencia (1775-1779) con KH …

2020

[ES] La aplicación de métodos automatizados en cualquier investigación ha facilitado el trasvase de metodologías de una disciplina a otra, permitiendo realizar análisis cuantitativos a textos con estructura o semiestructurados. El objeto de este trabajo es aplicar a un dataset en lenguaje natural -castellano del siglo XVIII- métodos de análisis de la disciplina de documentación. Pretende establecer una metodología automática de análisis cuantitativo y cualitativo de textos, que permita enriquecer en el futuro las conclusiones procedentes del análisis histórico tradicional. Este estudio construye los procedimientos necesarios para poder aplicar análisis de frecuencia, extracción y clasificac…

Computer scienceBIBLIOTECONOMIA Y DOCUMENTACIONUniversitatsLibrary and Information Sciences050905 science studiescomputer.software_genresiglo xviiiBibliography. Library science. Information resourcesQualitative analysis5202.01 Metodología de InvestigaciónClaustros universitarios1209.03 Análisis de Datoscastellano antiguoKH CoderSiglo XVIIIbusiness.industry05 social sciencesAnàlisi del discursanálisis de lenguaje naturalAutomationHumanitats InformàticaAnálisis de lenguaje naturalkh coderclaustros universitariosWork (electrical)Quantitative analysis (finance)Natural language analysisArtificial intelligence0509 other social sciencesCastellano antiguo050904 information & library sciencesbusinesscomputerWord frequency analysisNatural language processingZRevista Española de Documentación Científica
researchProduct