Sciweavers

1336 search results - page 28 / 268
» codes 2005
Sort
View
ISCAS
2005
IEEE
197views Hardware» more  ISCAS 2005»
15 years 3 months ago
Averaging attack resilient video fingerprinting
— This paper addresses an effective technique for digital fingerprinting for video. While orthogonal modulation technique is a straightforward and widely used method for digital ...
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-...
COCOON
2009
Springer
15 years 4 months ago
Limits to List Decoding Random Codes
It has been known since [Zyablov and Pinsker 1982] that a random q-ary code of rate 1 − Hq(ρ) − ε (where 0 < ρ < 1 − 1/q, ε > 0 and Hq(·) is the q-ary entropy ...
Atri Rudra
91
Voted
AVBPA
2005
Springer
347views Biometrics» more  AVBPA 2005»
15 years 3 months ago
Palmprint Authentication Based on Orientation Code Matching
Abstract. This paper presents a novel approach of palmprint authentication by matching the orientation code. In this approach, each point on a palmprint is assigned a orientation. ...
Xiangqian Wu, Kuanquan Wang, David Zhang
CC
2005
Springer
323views System Software» more  CC 2005»
15 years 3 months ago
CodeSurfer/x86-A Platform for Analyzing x86 Executables
CodeSurfer/x86 is a prototype system for analyzing x86 executables. It uses a static-analysis algorithm called value-set analysis (VSA) to recover intermediate representations that...
Gogul Balakrishnan, Radu Gruian, Thomas W. Reps, T...
ICSM
2005
IEEE
15 years 3 months ago
Towards a Framework for Testing Structural Source-Code Regularities
As size and complexity of software systems increase, preserving the design and specification of their implementation structure gains importance in order to maintain the evolvabil...
Kim Mens, Andy Kellens