Sciweavers

436 search results - page 4 / 88
» On two variations of identifying codes
Sort
View
IWDW
2005
Springer
15 years 3 months ago
Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information
In a fingerprinting scheme a distributor places marks in each copy of a digital object. Placing different marks in different copies, uniquely identifies the recipient of each cop...
Miguel Soriano, Marcel Fernandez, Josep Cotrina Na...
ESEM
2009
ACM
15 years 4 months ago
The evolution and impact of code smells: A case study of two open source systems
Code smells are design flaws in object-oriented designs that may lead to maintainability issues in the further evolution of the software system. This study focuses on the evolutio...
Steffen Olbrich, Daniela Cruzes, Victor R. Basili,...
ICCV
2005
IEEE
15 years 11 months ago
Identifying Individuals in Video by Combining "Generative" and Discriminative Head Models
The objective of this work is automatic detection and identification of individuals in unconstrained consumer video, given a minimal number of labelled faces as training data. Whi...
Mark Everingham, Andrew Zisserman
ICMCS
2006
IEEE
144views Multimedia» more  ICMCS 2006»
15 years 3 months ago
A New Quantization for Rate Control with Frame Variation Consideration
— The main role of rate control in video coding is to handle a trade-off between a bandwidth limit and a video quality. In the low-delay video communication systems, its responsi...
Seonki Kim, Seong-Jae Lim
CSMR
2010
IEEE
14 years 4 months ago
A Heuristic-Based Approach to Identify Concepts in Execution Traces
Abstract--Concept or feature identification, i.e., the identification of the source code fragments implementing a particular feature, is a crucial task during software understandin...
Fatemeh Asadi, Massimiliano Di Penta, Giuliano Ant...