Media authentication and tampering localization are important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded v...
Yao-Chung Lin, David P. Varodayan, Torsten Fink, E...
The paper presents a new approach to source code exploration, which is the result of integrating the Google Desktop Search (GDS) engine into the Eclipse development environment. T...
Abstract. In this PhD project, we deal with the issue of code duplication in logic programs. In particular semantical duplication or redundancy is generally viewed as a possible se...
Overcomplete transforms, like the Dual-Tree Complex Wavelet Transform, offer more flexible signal representations than criticallysampled transforms. Large numbers of transform coe...
We first present an equivalent definition of relative generalized Hamming weights of a linear code and its subcodes, and we develop a method using finite projective geometry. Makin...