Sciweavers

436 search results - page 55 / 88
» On two variations of identifying codes
Sort
View
ICIP
2001
IEEE
15 years 11 months ago
Compression and transmission of depth maps for image-based rendering
We consider applications using depth-based Imagebased rendering (IBR), where the synthesis of arbitrary views occur at a remote location, necessitating the compression and transmi...
Ravi Krishnamurthy, Bing-Bing Chai, Hai Tao, Srira...
ECOOP
2009
Springer
15 years 10 months ago
Practical API Protocol Checking with Access Permissions
Reusable APIs often dene usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while aording a great deal of al...
Kevin Bierhoff, Nels E. Beckman, Jonathan Aldrich
ICIP
2008
IEEE
15 years 4 months ago
H.264/AVC video scrambling for privacy protection
In this paper, we address the problem of privacy in video surveillance systems. More specifically, we consider the case of H.264/AVC which is the state-of-the-art in video coding....
Frédéric Dufaux, Touradj Ebrahimi
IWPC
2007
IEEE
15 years 4 months ago
Tracking Objects to Detect Feature Dependencies
The domain-specific ontology of a software system includes a set of features and their relationships. While the problem of locating features in object-oriented programs has been ...
Adrian Lienhard, Orla Greevy, Oscar Nierstrasz
KBSE
2006
IEEE
15 years 3 months ago
A Portable Compiler-Integrated Approach to Permanent Checking
Program checking technology is now a mature technology, but is not yet used on a large scale. We identify one cause of this gap in the decoupling of checking tools from the everyd...
Eugen-Nicolae Volanschi