Sciweavers

1310 search results - page 12 / 262
» On a Class of Traceability Codes
Sort
View
CORR
2008
Springer
103views Education» more  CORR 2008»
14 years 9 months ago
A Class of Transformations that Polarize Symmetric Binary-Input Memoryless Channels
Abstract-- A generalization of Arikan's polar code construction using transformations of the form Gn where G is an
Satish Babu Korada, Eren Sasoglu
84
Voted
RE
2005
Springer
15 years 2 months ago
Reverse Engineering Goal Models from Legacy Code
A reverse engineering process aims at reconstructing el abstractions from source code. This paper presents a novel reverse engineering methodology for recovering stakeholder goal ...
Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios L...
ICSE
2010
IEEE-ACM
14 years 11 months ago
Linking e-mails and source code artifacts
E-mails concerning the development issues of a system constitute an important source of information about high-level design decisions, low-level implementation concerns, and the s...
Alberto Bacchelli, Michele Lanza, Romain Robbes
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
15 years 1 months ago
Sequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Reihaneh Safavi-Naini, Yejing Wang
96
Voted
MCS
2010
Springer
15 years 4 months ago
Class-Separability Weighting and Bootstrapping in Error Correcting Output Code Ensembles
A method for applying weighted decoding to error-correcting output code ensembles of binary classifiers is presented. This method is sensitive to the target class in that a separa...
Raymond S. Smith, Terry Windeatt