Sciweavers

298 search results - page 27 / 60
» Towards experimental evaluation of code obfuscation techniqu...
Sort
View
IJCNN
2000
IEEE
14 years 1 months ago
Recursive Non Linear Models for On Line Traffic Prediction of VBR MPEG Coded Video Sources
Any performance evaluation of broadband networks requires modeling of the actual network traffic. Since multimedia services and especially MPEG coded video streams are expected to...
Anastasios D. Doulamis, Nikolaos D. Doulamis, Stef...
APSEC
1999
IEEE
14 years 28 days ago
An Approach for Measuring Software Evolution Using Source Code Features
One of the characteristics of large software systems is that they evolve over time. Evolution patterns include modifications related to the implementation, interfaces and the over...
Ladan Tahvildari, Richard Gregory, Kostas Kontogia...
IMC
2010
ACM
13 years 6 months ago
Primitives for active internet topology mapping: toward high-frequency characterization
Current large-scale topology mapping systems require multiple days to characterize the Internet due to the large amount of probing traffic they incur. The accuracy of maps from ex...
Robert Beverly, Arthur Berger, Geoffrey G. Xie
ICMCS
2009
IEEE
106views Multimedia» more  ICMCS 2009»
13 years 6 months ago
Modeling and analysis of content identification
Content fingerprinting provides a compact content-based representation of a multimedia document. An important application of fingerprinting is the identification of modified copie...
Avinash L. Varna, Min Wu
IEEEPACT
2006
IEEE
14 years 2 months ago
An empirical evaluation of chains of recurrences for array dependence testing
Code restructuring compilers rely heavily on program analysis techniques to automatically detect data dependences between program statements. Dependences between statement instanc...
Johnnie Birch, Robert A. van Engelen, Kyle A. Gall...