Sciweavers

1629 search results - page 168 / 326
» Infeasible Code Detection
Sort
View
85
Voted
ICIP
2008
IEEE
16 years 9 hour ago
Adaptive decoding for halftone orientation-based data hiding
Halftone image watermarking techniques that allow automated extraction of the embedded watermark data are useful in a variety of document security and workflow applications. The p...
Orhan Bulan, Gaurav Sharma, Vishal Monga
79
Voted
KBSE
2009
IEEE
15 years 5 months ago
ReAssert: Suggesting Repairs for Broken Unit Tests
—Developers often change software in ways that cause tests to fail. When this occurs, developers must determine whether failures are caused by errors in the code under test or in...
Brett Daniel, Vilas Jagannath, Danny Dig, Darko Ma...
120
Voted
FOAL
2009
ACM
15 years 4 months ago
Unweaving the impact of aspect changes in AspectJ
Aspect-oriented programming (AOP) fosters the coding of tangled concerns in separated units that are then woven together in the executable system. Unfortunately, the oblivious nat...
Luca Cavallaro, Mattia Monga
86
Voted
DFT
2007
IEEE
135views VLSI» more  DFT 2007»
15 years 4 months ago
Fault Secure Encoder and Decoder for Memory Applications
We introduce a reliable memory system that can tolerate multiple transient errors in the memory words as well as transient errors in the encoder and decoder (corrector) circuitry....
Helia Naeimi, André DeHon
70
Voted
MMSEC
2005
ACM
114views Multimedia» more  MMSEC 2005»
15 years 3 months ago
Watermarking of MPEG-2 video in compressed domain using VLC mapping
In this work we propose a new algorithm for fragile, high capacity yet file-size preserving watermarking of MPEG-2 streams. Watermarking is done entirely in the compressed domain,...
Bijan G. Mobasseri, Michael P. Marcinak