Sciweavers

1629 search results - page 70 / 326
» Infeasible Code Detection
Sort
View
ICSE
2010
IEEE-ACM
13 years 8 months ago
Fourth International Workshop on Software Clones (IWSC)
Software clones are identical or similar pieces of code. They are often the result of copy–and–paste activities as ad-hoc code reuse by programmers. Software clones research i...
Katsuro Inoue, Stanislaw Jarzabek, James R. Cordy,...
TC
2008
13 years 10 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
ICMCS
2006
IEEE
157views Multimedia» more  ICMCS 2006»
14 years 4 months ago
A Context-Based Error Detection Strategy into H.264/AVC CABAC
Various error control schemes have been addressed in wireless video stream transmission. By combining an adaptive binary arithmetic coding technique with context modeling, CABAC a...
Yang Li, Hongkai Xiong, Li Song, Songyu Yu
ICDAR
2009
IEEE
14 years 5 months ago
Seal Detection and Recognition: An Approach for Document Indexing
Reliable indexing of documents having seal instances can be achieved by recognizing seal information. This paper presents a novel approach for detecting and classifying such multi...
Partha Pratim Roy, Umapada Pal, Josep Lladó...
JUCS
2006
101views more  JUCS 2006»
13 years 10 months ago
DS/CDMA Multiuser Detection with Evolutionary Algorithms
This work analyses two heuristic algorithms based on the genetic evolution theory applied to direct sequence code division multiple access (DS/CDMA) communication systems. For diff...
Fernando Ciriaco, Taufik Abrão, Paul Jean E...