Sciweavers

252 search results - page 41 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
ICDCS
2008
IEEE
14 years 3 months ago
Hotness-Aware Sensor Networks
In a realistic sensor network, in particular with a nonuniform deployment, sensor nodes inevitably have varying workloads. This causes a natural problem that some sensor nodes are...
Dong Li, Yanmin Zhu, Li Cui, Lionel M. Ni
KBSE
2008
IEEE
14 years 3 months ago
Test-Suite Augmentation for Evolving Software
One activity performed by developers during regression testing is test-suite augmentation, which consists of assessing the adequacy of a test suite after a program is modified an...
Raúl A. Santelices, Pavan Kumar Chittimalli...
COMPSAC
2006
IEEE
14 years 2 months ago
On the Distribution of Property Violations in Formal Models: An Initial Study
Model-checking techniques are successfully used in the verification of both hardware and software systems of industrial relevance. Unfortunately, the capability of current techni...
Jimin Gao, Mats Per Erik Heimdahl, David Owen, Tim...
ICMCS
2005
IEEE
129views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Feature Selection and Stacking for Robust Discrimination of Speech, Monophonic Singing, and Polyphonic Music
In this work we strive to find an optimal set of acoustic features for the discrimination of speech, monophonic singing, and polyphonic music to robustly segment acoustic media st...
Björn Schuller, Brüning J. B. Schmitt, D...
JSS
2007
120views more  JSS 2007»
13 years 8 months ago
The design and evaluation of path matching schemes on compressed control flow traces
A control flow trace captures the complete sequence of dynamically executed basic blocks and function calls. It is usually of very large size and therefore commonly stored in com...
Yongjing Lin, Youtao Zhang, Rajiv Gupta