Sciweavers

7886 search results - page 70 / 1578
» An evaluation of bipartitioning techniques
Sort
View
FTCS
1997
99views more  FTCS 1997»
13 years 10 months ago
Toward Accessibility Enhancement of Dependability Modeling Techniques and Tools
Fast turnaroundtime independabilityevaluation iscrucialfor e cient fault-tolerant system design and dependability of the resulting product since timely feedbacks will allow more i...
Ann T. Tai, Herbert Hecht, Kishor S. Trivedi, Bing...
IWPC
2008
IEEE
14 years 3 months ago
Scenario-Based Comparison of Clone Detection Techniques
Over the last decade many techniques for software clone detection have been proposed. In this paper, we provide a comprehensive survey of the capabilities of currently available c...
Chanchal Kumar Roy, James R. Cordy
ICCAD
1998
IEEE
196views Hardware» more  ICCAD 1998»
14 years 1 months ago
Analysis of watermarking techniques for graph coloring problem
We lay out a theoretical framework to evaluate watermarking techniques for intellectual property protection (IPP). Based on this framework, we analyze two watermarking techniques ...
Gang Qu, Miodrag Potkonjak
KES
2005
Springer
14 years 2 months ago
Comparison of Feature Extraction Techniques for Watermark Synchronization
Abstract. This paper evaluates feature extraction techniques in aspect of watermark synchronization. Most watermarking algorithms suffer from geometric distortion attacks that desy...
Hae-Yeoun Lee, Heung-Kyu Lee, Junseok Lee
IWCMC
2010
ACM
13 years 11 months ago
A flow trace generator using graph-based traffic classification techniques
We propose a novel methodology to generate realistic network flow traces to enable systematic evaluation of network monitoring systems in various traffic conditions. Our technique...
Peter Siska, Marc Ph. Stoecklin, Andreas Kind, Tor...