Sciweavers

5962 search results - page 363 / 1193
» Working with Patterns and Code
Sort
View
KBSE
2007
IEEE
15 years 11 months ago
Keyword programming in java
Keyword programming is a novel technique for reducing the need to remember details of programming language syntax and APIs, by translating a small number of keywords provided by t...
Greg Little, Robert C. Miller
KBSE
2007
IEEE
15 years 11 months ago
A dynamic birthmark for java
Code theft is a threat for companies that consider code as a core asset. A birthmark can help them to prove code theft by identifying intrinsic properties of a program. Two progra...
David Schuler, Valentin Dallmeier, Christian Lindi...
GLOBECOM
2006
IEEE
15 years 11 months ago
Rate Adaptation for Cooperative Systems
— Throughput is an important performance measure for data communications over wireless links. In this work, we consider joint adaptation of coding rates, modulation modes and lev...
Zinan Lin, Elza Erkip, Monisha Ghosh
ACSAC
2005
IEEE
15 years 10 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler
MMSEC
2005
ACM
114views Multimedia» more  MMSEC 2005»
15 years 10 months ago
Watermarking of MPEG-2 video in compressed domain using VLC mapping
In this work we propose a new algorithm for fragile, high capacity yet file-size preserving watermarking of MPEG-2 streams. Watermarking is done entirely in the compressed domain,...
Bijan G. Mobasseri, Michael P. Marcinak