The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
—Use of watermarking techniques to provide authentication and tamper proofing of speech in mobile environment is becoming important. However, the current efforts do not allow for...
K. J.-L. Christabel, Sabu Emmanuel, Mohan S. Kanka...
Abstract. The use of Internet as an ubiquitous communication platform puts a strong demand on service providers regarding the assurance of multiple service levels consistently. Des...
This paper presents a method to estimate the bit error rate (BER) of the wireless channel based on statistical analysis of the soft output of the receiver only. In HiperLAN/2 sever...
Lodewijk T. Smit, Gerard J. M. Smit, Johann Hurink...
The quality of the lung nodule models determines the success of lung nodule detection. This paper describes aspects of our data-driven approach for modeling lung nodules using the...