Sciweavers

2572 search results - page 196 / 515
» codes 2008
Sort
View
ESEM
2009
ACM
15 years 2 months ago
Security of open source web applications
In an empirical study of fourteen widely used open source PHP web applications, we found that the vulnerability density of the aggregate code base decreased from 8.88 vulnerabilit...
James Walden, Maureen Doyle, Grant A. Welch, Micha...
ICCAD
2008
IEEE
108views Hardware» more  ICCAD 2008»
16 years 1 months ago
FBT: filled buffer technique to reduce code size for VLIW processors
— VLIW processors provide higher performance and better efficiency etc. than RISC processors in specific domains like multimedia applications etc. A disadvantage is the bloated...
Talal Bonny, Jörg Henkel
ICASSP
2008
IEEE
15 years 11 months ago
Transmit codes and receive filters for pulse compression radar systems
Pulse compression radar systems make use of transmit code sequences and receive filters that are specially designed to achieve good range resolution and target detection capabili...
Petre Stoica, Jian Li, Ming Xue
BIOID
2008
149views Biometrics» more  BIOID 2008»
15 years 6 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....
ICIP
2006
IEEE
16 years 6 months ago
Backward Channel Aware Wyner-Ziv Video Coding
Wyner-Ziv video coding is a coding method that exploits source statistics at the decoder. Many Wyner-Ziv video coding schemes encode a video sequence into two types of frames, key...
Limin Liu, Zhen Li, Edward J. Delp