Sciweavers

852 search results - page 132 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
ICMCS
2007
IEEE
104views Multimedia» more  ICMCS 2007»
15 years 10 months ago
A Perception-based Scalable Encryption Model for AVS Audio
Audio Video coding Standard (AVS) is China’s secondgeneration source coding/decoding standard with fully Intellectual Properties. As the sixth part of AVS standard, AVSDRM aims ...
Lan Juan, Huang Tie-Jun, Qu Jun-Hua
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
15 years 10 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
PROFES
2004
Springer
15 years 9 months ago
Using a Reference Application with Design Patterns to Produce Industrial Software
Abstract. System architectures are described in abstract terms, often using Design Patterns. Actual reuse based on such descriptions requires that each development project derive a...
Marek Vokác, Oluf Jensen
INFOCOM
2010
IEEE
15 years 2 months ago
Reliable Wireless Broadcasting with Near-Zero Feedback
We examine the problem of minimizing feedbacks in reliable wireless broadcasting, by pairing rateless coding with extreme value theory. Our key observation is that, in a broadcast ...
Weiyao Xiao, Sachin Agarwal, David Starobinski, Ar...
IUI
2006
ACM
15 years 10 months ago
Automatic construction of personalized customer interfaces
Interface personalization can improve a user’s performance and subjective impression of interface quality and responsiveness. Personalization is difficult to implement as it req...
Robert Price, Russell Greiner, Gerald Häubl, ...