Sciweavers

1448 search results - page 96 / 290
» From Requirements to Code Revisited
Sort
View
155
Voted
MEDIAFORENSICS
2010
15 years 5 months ago
Minimizing embedding impact in steganography using trellis-coded quantization
In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance...
Tomás Filler, Jan Judas, Jessica J. Fridric...
161
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Scalable Modulation for Scalable Wireless Videocast
Abstract— In conventional wireless systems with layered architectures, the physical layer treats all data streams from upper layers equally and apply the same modulation and codi...
Lin Cai, Yuanqian Luo, Siyuan Xiang, Jianping Pan
114
Voted
CORR
2006
Springer
110views Education» more  CORR 2006»
15 years 3 months ago
Reliable Multi-Path Routing Schemes for Real-Time Streaming
In off-line streaming, packet level erasure resilient Forward Error Correction (FEC) codes rely on the unrestricted buffering time at the receiver. In real-time streaming, the ext...
Emin Gabrielyan, Roger D. Hersch
115
Voted
IJES
2006
110views more  IJES 2006»
15 years 3 months ago
Partitioning bin-packing algorithms for distributed real-time systems
Embedded real-time systems must satisfy not only logical functional requirements but also para-functional properties such as timeliness, Quality of Service (QoS) and reliability. W...
Dionisio de Niz, Raj Rajkumar
144
Voted
CCS
2009
ACM
16 years 4 months ago
Lightweight self-protecting JavaScript
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designe...
Phu H. Phung, David Sands, Andrey Chudnov