Sciweavers

1282 search results - page 157 / 257
» Practical Loss-Resilient Codes
Sort
View
CCS
2007
ACM
15 years 11 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
135
Voted
ACCV
2006
Springer
15 years 11 months ago
Dense 3D Reconstruction with an Uncalibrated Active Stereo System
In this paper, we describe a novel uncalibrated active stereo system using coded structured light. Structured-light-based active stereo systems generally consist of a camera and pr...
Hiroshi Kawasaki, Yutaka Ohsawa, Ryo Furukawa, Yas...
ISSTA
2006
ACM
15 years 11 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
ISM
2005
IEEE
153views Multimedia» more  ISM 2005»
15 years 10 months ago
Application Layer Error Correction Scheme for Video Header Protection on Wireless Network
In wireless video streaming application, video information may be corrupted by a noisy channel. By introducing error resilience and error concealment techniques, many researchers ...
Chia-Ho Pan, I-Hsien Lee, Sheng-Chieh Huang, Chih-...
109
Voted
EUROPKI
2004
Springer
15 years 10 months ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith