Sciweavers

3604 search results - page 35 / 721
» All Common Subsequences
Sort
View
JEI
2006
128views more  JEI 2006»
13 years 8 months ago
Performance study of common image steganography and steganalysis techniques
Abstract. We investigate the performance of state of the art universal steganalyzers proposed in the literature. These universal steganalyzers are tested against a number of well-k...
Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
NAACL
2001
13 years 10 months ago
Identifying Cognates by Phonetic and Semantic Similarity
I present a method of identifying cognates in the vocabularies of related languages. I show that a measure of phonetic similarity based on multivalued features performs better tha...
Grzegorz Kondrak
ASSETS
2008
ACM
13 years 10 months ago
Accessibility commons: a metadata infrastructure for web accessibility
Research projects, assistive technology, and individuals all create metadata in order to improve Web accessibility for visually impaired users. However, since these projects are d...
Shinya Kawanaka, Yevgen Borodin, Jeffrey P. Bigham...
JSS
2007
126views more  JSS 2007»
13 years 8 months ago
Fine-grain analysis of common coupling and its application to a Linux case study
Common coupling (sharing global variables across modules) is widely accepted as a measure of software quality and maintainability; a low level of common coupling is necessary (but...
Dror G. Feitelson, Tokunbo O. S. Adeshiyan, Daniel...
SIGSOFT
2002
ACM
14 years 9 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...