Sciweavers

1336 search results - page 48 / 268
» codes 2005
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
ICMCS
2005
IEEE
208views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Error Resilient Coding Based on Reversible Data Embedding Technique for H.264/AVC Video
In this paper, a prescription-based error concealment (PEC) method is proposed. PEC relies on pre-analyses of the concealment error image (CEI) for I-frames and the optimal error ...
Wen-Nung Lie, Tom C.-I. Lin, Dung-Chan Tsai, Guo-S...
ICSM
2005
IEEE
15 years 3 months ago
Quality Driven Software Migration of Procedural Code to Object-Oriented Design
In the context of software maintenance, legacy software systems are continuously re-engineered in order to correct errors, provide new functionality, or port them into modern plat...
Ying Zou
ICSM
2005
IEEE
15 years 3 months ago
IRiSS - A Source Code Exploration Tool
IRiSS (Information Retrieval based Software Search) is a software exploration tool that uses an indexing engine based on an information retrieval method. IRiSS is implemented as a...
Denys Poshyvanyk, Andrian Marcus, Yubo Dong, Andre...
ISCC
2005
IEEE
15 years 3 months ago
A Game Theoretic Analysis of Protocols Based on Fountain Codes
In this paper we analyze a novel paradigm of reliable communications which is not based on the traditional timeout-and-retransmit mechanism of TCP. Our approach, which we call FBP...
Luis López, Antonio Fernández, Vicen...