Sciweavers

947 search results - page 131 / 190
» Analysis of Techniques to Improve Protocol Processing Latenc...
Sort
View
IWDW
2005
Springer
15 years 6 months ago
A Survey of Watermarking Security
Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive...
Teddy Furon
SIBGRAPI
1999
IEEE
15 years 5 months ago
Interpolation of Scattered Data: Investigating Alternatives for the Modified Shepard Method
Many scientific applications use scattered data originated from samples. Interpolation techniques are necessary to estimate the values on non-sampled regions. In a previous work, t...
Karen Basso, Paulo Ricardo de Ávila Zingano...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 5 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ICASSP
2010
IEEE
14 years 12 months ago
A comparison of approaches for modeling prosodic features in speaker recognition
Prosodic information has been successfully used for speaker recognition for more than a decade. The best-performing prosodic system to date has been one based on features extracte...
Luciana Ferrer, Nicolas Scheffer, Elizabeth Shribe...
CORR
2012
Springer
286views Education» more  CORR 2012»
13 years 9 months ago
A Faster Algorithm for Solving One-Clock Priced Timed Games
One-clock priced timed games is a class of two-player, zero-sum, continuous-time games that was defined and thoroughly studied in previous works. We show that One-clock priced ti...
Thomas Dueholm Hansen, Rasmus Ibsen-Jensen, Peter ...