Sciweavers

149 search results - page 19 / 30
» Visual Detection of Duplicated Code
Sort
View
SIBGRAPI
2003
IEEE
14 years 1 months ago
Secure Authentication Watermarking for Binary Images
Abstract. Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authen...
Hae Yong Kim, Amir Afif
NECO
2000
133views more  NECO 2000»
13 years 8 months ago
Neural Coding: Higher-Order Temporal Patterns in the Neurostatistics of Cell Assemblies
Recent advances in the technology of multi-unit recordings make it possible to test Hebb's hypothesis that neurons do not function in isolation but are organized in assemblie...
Laura Martignon, Gustavo Deco, Kathryn B. Laskey, ...
VVS
2000
IEEE
176views Visualization» more  VVS 2000»
14 years 24 days ago
4D volume rendering with the Shear Warp factorisation
A novel approach for rendering time-varying data based on the Shear-Warp factorisation is presented. Reduction in storage space is achieved by detecting the changed areas within e...
Kostas Anagnostou, Tim J. Atherton, Andrew E. Wate...
IV
2008
IEEE
105views Visualization» more  IV 2008»
14 years 2 months ago
A Dual-View Visualization of In-Car Communication Processes
With the increasing complexity of in-car communication architectures, their diagnostics have become essential for automotive development and maintenance. In order to help engineer...
Michael Sedlmair, Wolfgang Hintermaier, Konrad Sto...
IWPSE
2007
IEEE
14 years 2 months ago
Visual identification of software evolution patterns
Software evolution plays a key role in the overall lifecycle of a software system. In this phase, software developers extend the capabilities and functionality of the system to me...
Andrejs Jermakovics, Marco Scotto, Giancarlo Succi