Sciweavers

909 search results - page 153 / 182
» Reversible data hiding
Sort
View
CCS
2010
ACM
13 years 8 months ago
TAPS: automatically preparing safe SQL queries
We present the first sound program transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsafe SQL...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...
VTC
2010
IEEE
259views Communications» more  VTC 2010»
13 years 7 months ago
User Multiplexing in Relay Enhanced LTE-Advanced Networks
—The 3rd Generation Partnership Project has recently started the standardization process for LTE-Advanced, as a major evolution step of UTRAN LTE Release 8. One of the key enhanc...
Oumer M. Teyeb, Frank Frederiksen, Vinh Van Phan, ...
CC
2010
Springer
118views System Software» more  CC 2010»
13 years 7 months ago
Unrestricted Code Motion: A Program Representation and Transformation Algorithms Based on Future Values
Abstract. We introduce the concept of future values. Using future values it is possible to represent programs in a new control-flow form such that on any control flow path the data...
Shuhan Ding, Soner Önder
NAACL
2010
13 years 6 months ago
Dependency Tree-based Sentiment Classification using CRFs with Hidden Variables
In this paper, we present a dependency treebased method for sentiment classification of Japanese and English subjective sentences using conditional random fields with hidden varia...
Tetsuji Nakagawa, Kentaro Inui, Sadao Kurohashi
ACCV
2010
Springer
13 years 4 months ago
A Weak Structure Model for Regular Pattern Recognition Applied to Facade Images
Abstract. We propose a novel method for recognition of structured images and demonstrate it on detection of windows in facade images. Given an ability to obtain local low-level dat...
Radim Tylecek, Radim Sára