Sciweavers

762 search results - page 43 / 153
» A study of the uniqueness of source code
Sort
View
WCRE
2005
IEEE
14 years 2 months ago
Enriching Reverse Engineering with Semantic Clustering
Understanding a software system by just analyzing the structure of the system reveals only half of the picture, since the structure tells us only how the code is working but not w...
Adrian Kuhn, Stéphane Ducasse, Tudor G&icir...
EMNLP
2010
13 years 7 months ago
Practical Linguistic Steganography Using Contextual Synonym Substitution and Vertex Colour Coding
Linguistic Steganography is concerned with hiding information in natural language text. One of the major transformations used in Linguistic Steganography is synonym substitution. ...
Ching-Yun Chang, Stephen Clark
VL
2007
IEEE
166views Visual Languages» more  VL 2007»
14 years 3 months ago
Community-Based Scaffolding to Promote End-User Learning
End-user programming provides a unique opportunity to study informal computer science education and knowledge acquisition in the real world. We seek to explore the use of communit...
Brian Dorn
CRYPTO
1991
Springer
105views Cryptology» more  CRYPTO 1991»
14 years 18 days ago
Universal Hashing and Authentication Codes
In this paper, we study the application of universal hashingto the construction of unconditionally secure authentication codes without secrecy. This idea is most useful when the nu...
Douglas R. Stinson
ICASSP
2011
IEEE
13 years 24 days ago
Joint source-channel rate control for pixel-domain distributed video coding
We study the scenario of pixel-domain distributed video coding for noisy transmission environments and propose a method to allocate the available rate between source coding and ch...
Hu Chen, Eckehard G. Steinbach, Chang Wen Chen