Video summarization approaches have various fields of application, specifically related to organizing, browsing and accessing large video databases. In this paper we propose and ev...
Uros Damnjanovic, Tomas Piatrik, Divna Djordjevic,...
The automated analysis of feature models is recognized as one of the key challenges for automated software development in the context of Software Product Lines (SPL). However, aft...
David Benavides, Sergio Segura, Pablo Trinidad, An...
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Querying its own history is an important mechanism in the computations, especially those interacting with people or other computations such as transaction processing, electronic d...
Both the number of embedded memories, as well as the total embedded memory content in our chips is growing steadily. Time for chip designers, EDA makers, and test engineers to upd...
Erik Jan Marinissen, Betty Prince, Doris Keitel-Sc...