Sciweavers

149 search results - page 18 / 30
» Are good code reviewers also good at design review
Sort
View
SIBGRAPI
2003
IEEE
14 years 24 days ago
Secure Authentication Watermarking for Binary Images
Abstract. Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authen...
Hae Yong Kim, Amir Afif
TCSV
2008
102views more  TCSV 2008»
13 years 7 months ago
The Technique of Prescaled Integer Transform: Concept, Design and Applications
Integer cosine transform (ICT) is adopted by H.264/AVC for its bit-exact implementation and significant complexity reduction compared to the discrete cosine transform (DCT) with an...
Cixun Zhang, Lu Yu, Jian Lou, Wai-kuen Cham, Jie D...
PPDP
2009
Springer
14 years 2 months ago
Automatic refactoring of Erlang programs
This paper describes the design goals and current status of tidier, a software tool that tidies Erlang source code, making it cleaner, simpler, and often also more efficient. In ...
Konstantinos F. Sagonas, Thanassis Avgerinos
ICASSP
2008
IEEE
14 years 2 months ago
Transmit codes and receive filters for pulse compression radar systems
Pulse compression radar systems make use of transmit code sequences and receive filters that are specially designed to achieve good range resolution and target detection capabili...
Petre Stoica, Jian Li, Ming Xue
UIST
1993
ACM
13 years 11 months ago
Model-based User Interface Design by Example and by Interview
Model-based user interface design is centered around a description of application objects and operations at a level of ion higher than that of code. A good model can be used to su...
Martin R. Frank, James D. Foley