Sciweavers

3316 search results - page 532 / 664
» Mining Software Engineering Data
Sort
View
CCS
2007
ACM
15 years 4 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
DRM
2007
Springer
15 years 4 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
CODES
2006
IEEE
15 years 4 months ago
Key technologies for the next generation wireless communications
The principal objectives of next generation wireless communication are the delivery of higher data rate services including video, audio, data and voice signals with worldwide comp...
Kyung-Ho Kim
CODES
2006
IEEE
15 years 4 months ago
The pipeline decomposition tree: : an analysis tool for multiprocessor implementation of image processing applications
Modern embedded systems for image processing involve increasingly complex levels of functionality under real-time and resourcerelated constraints. As this complexity increases, th...
Dong-Ik Ko, Shuvra S. Bhattacharyya
EUROMICRO
2006
IEEE
15 years 4 months ago
From PRIMI to PRIMIFaces: Technical Concepts for Selective Information Disclosure
Instant messaging platforms facilitate coordination in workgroups by providing users with mutual information on their presence and availability, allowing for ad-hoc conversations ...
Tom Gross, Christoph Oemig