Sciweavers

1629 search results - page 188 / 326
» Infeasible Code Detection
Sort
View
IH
2007
Springer
15 years 7 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath
WCRE
2005
IEEE
15 years 7 months ago
Diagnosing Design Problems in Object Oriented Systems
Software decay is a phenomenon that plagues aging software systems. While in recent years, there has been significant progress in the area of automatic detection of “code smells...
Adrian Trifu, Radu Marinescu
UCS
2004
Springer
15 years 7 months ago
Real-World Interaction with Camera Phones
With the integration of cameras, mobile phones have evolved into networked personal image capture devices. Camera-phones can perform image processing tasks on the device itself an...
Michael Rohs
CW
2004
IEEE
15 years 5 months ago
Barcode Readers using the Camera Device in Mobile Phones
This paper shows new algorithms and the implementations of image reorganization for EAN/QR barcodes in mobile phones. The mobile phone system used here consists of a camera, mobil...
Eisaku Ohbuchi, Hiroshi Hanaizumi, Lim Ah Hock
ECBS
2004
IEEE
129views Hardware» more  ECBS 2004»
15 years 5 months ago
Using Feature Modeling for Program Comprehension and Software Architecture Recovery
: The available evidence in a legacy software system, which can help in its understanding and recovery of its architecture are not always sufficient. Very often the system's d...
Ilian Pashov, Matthias Riebisch