Sciweavers

1548 search results - page 52 / 310
» Estimating Software Vulnerabilities
Sort
View
ICIP
2004
IEEE
16 years 22 days ago
Estimation of attacker's scale and noise variance for qim-dc watermark embedding
Quantization-based watermarking schemes are vulnerable to amplitude scaling. Therefore, the scaling factor needs to be estimated at the decoder side, such that the received (attac...
Reginald L. Lagendijk, Ivo D. Shterev
CORR
2006
Springer
96views Education» more  CORR 2006»
14 years 11 months ago
How accurate are the time delay estimates in gravitational lensing?
We present a novel approach to estimate the time delay between light curves of multiple images in a gravitationally lensed system, based on Kernel methods in the context of machine...
Juan C. Cuevas-Tello, Peter Tino, Somak Raychaudhu...
ISPW
2006
IEEE
15 years 5 months ago
COCOMO-U: An Extension of COCOMO II for Cost Estimation with Uncertainty
Da Yang, Yuxiang Wan, Zinan Tang, Shujian Wu, Mei ...
67
Voted
CODES
1996
IEEE
15 years 3 months ago
A Co-Design Methodology Based on Formal Specification and High-level Estimation
Carlos Carreras, Juan Carlos López, Mar&iac...
IPPS
2007
IEEE
15 years 5 months ago
A Markov Reward Model for Software Reliability
A compositional method for estimating software reliability of many threaded programs is developed. The method uses estimates of the reliability of individual modules and the proba...
YoungMin Kwon, Gul Agha