Sciweavers

1282 search results - page 157 / 257
» Practical Loss-Resilient Codes
Sort
View
CCS
2007
ACM
14 years 4 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
ACCV
2006
Springer
14 years 4 months ago
Dense 3D Reconstruction with an Uncalibrated Active Stereo System
In this paper, we describe a novel uncalibrated active stereo system using coded structured light. Structured-light-based active stereo systems generally consist of a camera and pr...
Hiroshi Kawasaki, Yutaka Ohsawa, Ryo Furukawa, Yas...
ISSTA
2006
ACM
14 years 4 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
ISM
2005
IEEE
153views Multimedia» more  ISM 2005»
14 years 3 months ago
Application Layer Error Correction Scheme for Video Header Protection on Wireless Network
In wireless video streaming application, video information may be corrupted by a noisy channel. By introducing error resilience and error concealment techniques, many researchers ...
Chia-Ho Pan, I-Hsien Lee, Sheng-Chieh Huang, Chih-...
EUROPKI
2004
Springer
14 years 3 months ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith