Sciweavers

1629 search results - page 114 / 326
» Infeasible Code Detection
Sort
View
ICIP
2007
IEEE
15 years 11 months ago
Image Authentication Based on Distributed Source Coding
Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original imag...
Yao-Chung Lin, David P. Varodayan, Bernd Girod
ICIAP
2005
ACM
15 years 10 months ago
Qualitative Real-Time Range Extraction for Preplanned Scene Partitioning Using Laser Beam Coding
This paper proposes a novel technique to extract range using a phase-only filter for a laser beam. The workspace is partitioned according to M meaningful preplanned range segments...
Didi Sazbon, Zeev Zalevsky, Ehud Rivlin
GLOBECOM
2008
IEEE
15 years 4 months ago
Location-Aware Cooperative Communications Utilizing Linear Network Coding
— Cooperative communication can be used to reduce the transmit power of distant mobile units, compared to conventional direct transmission, given the same quality-of-service. How...
Hung-Quoc Lai, Ahmed S. Ibrahim, K. J. Ray Liu
CODES
2007
IEEE
15 years 4 months ago
A smart random code injection to mask power analysis based side channel attacks
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...
ASWEC
2004
IEEE
15 years 1 months ago
Teaching the Process of Code Review
Behavioural theory predicts that interventions that improving individual reviewers' expertise improves Software Development Technical Review group performance [3, p 6]. This ...
Tor Stålhane, Cat Kutay, Hiyam Al-Kilidar, D...