Sciweavers

2610 search results - page 63 / 522
» codes 2007
Sort
View
ICISC
2004
122views Cryptology» more  ICISC 2004»
15 years 1 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...
ICMCS
2007
IEEE
121views Multimedia» more  ICMCS 2007»
15 years 6 months ago
Adaptive Spatial and Transform Domain FGS Coding
In inter-picture coding, block-based frequency transform is usually carried out on the predicted errors for each interblock to remove the spatial correlation among them. However, ...
Li Zhang, Xiangyang Ji, Wen Gao, Debin Zhao
IJCAI
2007
15 years 1 months ago
Direct Code Access in Self-Organizing Neural Networks for Reinforcement Learning
TD-FALCON is a self-organizing neural network that incorporates Temporal Difference (TD) methods for reinforcement learning. Despite the advantages of fast and stable learning, TD...
Ah-Hwee Tan
ECOOP
2007
Springer
15 years 3 months ago
Automation of Refactoring and Refactoring Suggestions for TTCN-3 Test Suites. The TRex TTCN-3 Refactoring and Metrics Tool
Refactoring is not only useful for source code of implementations, but as well for test specifications. The open source TRex tool automates the application of refactorings and the ...
Helmut Neukirchen, Benjamin Zeiss
CAINE
2003
15 years 1 months ago
Optimized Implementation of Distributed Real-Time Embedded Systems Mixing Control and Data Processing
Most distributed real-time embedded systems are specified combining state diagram and data flow languages. This leads to several real-time codes which together do not necessaril...
Nicolas Pernet, Yves Sorel