During development and testing, changes made to a system to repair a detected fault can often inject a new fault into the code base. These injected faults may not be in the same f...
Inspired by the context of compressing encrypted sources, this paper considers the general tradeoff between rate, end-to-end delay, and probability of error for lossless source co...
—This paper describes an empirical study that addresses the issue of communication among members of a software development organization. In particular, data was collected concern...
In the present communication, the effects of the eminent JPEG2000 new compression standard on watermarking techniques are investigated. It is shown that the choice of different cod...
In this paper, an experimental comparison among three structural approaches to fingerprint classification is reported. Main pros and cons of such approaches are investigated by exp...
Alessandra Serrau, Gian Luca Marcialis, Horst Bunk...