Sciweavers

1518 search results - page 148 / 304
» Cryptographic Test Correction
Sort
View
BCS
2008
15 years 5 months ago
Improved SIFT-Features Matching for Object Recognition
: The SIFT algorithm (Scale Invariant Feature Transform) proposed by Lowe [1] is an approach for extracting distinctive invariant features from images. It has been successfully app...
Faraj Alhwarin, Chao Wang, Danijela Ristic-Durrant...
SSWMC
2004
15 years 5 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
86
Voted
CORR
2010
Springer
66views Education» more  CORR 2010»
15 years 3 months ago
Certifying cost annotations in compilers
We discuss the problem of building a compiler which can lift in a provably correct way pieces of information on the execution cost of the object code to cost annotations on the so...
Roberto M. Amadio, Nicholas Ayache, Yann Ré...
ENTCS
2008
87views more  ENTCS 2008»
15 years 3 months ago
A Lightweight Approach for the Semantic Validation of Model Refinements
Model Driven Engineering proposes the use of models at different levels of ion. Step by step validation of model refinements is necessary to guarantee the correctness of the final ...
Claudia Pons, Diego García
ASE
2006
122views more  ASE 2006»
15 years 3 months ago
Combining Proof Plans with Partial Order Planning for Imperative Program Synthesis
The structured programming literature provides methods and a wealth of heuristic knowledge for guiding the construction of provably correct imperative programs. We investigate the...
Andrew Ireland, Jamie Stark