Sciweavers

2018 search results - page 205 / 404
» Code Normal Forms
Sort
View
DCC
2002
IEEE
16 years 2 months ago
Source Requantization: Successive Degradation and Bit Stealing
We consider source requantization in two forms -- successive degradation (i.e., source fidelity reduction) and bit stealing (i.e., information embedding) -when no forward planning...
Aaron S. Cohen, Stark C. Draper, Emin Martinian, G...
DCC
2010
IEEE
15 years 10 months ago
On the Systematic Measurement Matrix for Compressed Sensing in the Presence of Gross Errors
Inspired by syndrome source coding using linear error-correcting codes, we explore a new form of measurement matrix for compressed sensing. The proposed matrix is constructed in t...
Zhi Li, Feng Wu, John Wright
IWPC
2008
IEEE
15 years 9 months ago
Ensuring Well-Behaved Usage of APIs through Syntactic Constraints
Libraries are the most widespreaded form of software reuse. In order to properly use a library API, its clients should fulfill a series of (many times implicit) assumptions made ...
Martin Feilkas, Daniel Ratiu
VL
2008
IEEE
171views Visual Languages» more  VL 2008»
15 years 9 months ago
Usability challenges for enterprise service-oriented architecture APIs
An important part of many programming tasks is the use of libraries and other forms of Application Programming Interfaces (APIs). Programming via web services using a Service-Orie...
Jack Beaton, Sae Young Jeong, Yingyu Xie, Jeffrey ...
ACSAC
2006
IEEE
15 years 9 months ago
Known/Chosen Key Attacks against Software Instruction Set Randomization
Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomiz...
Yoav Weiss, Elena Gabriela Barrantes