Sciweavers

38 search results - page 8 / 8
» Preservation Of Patterns and Input-Output Privacy
Sort
View
TSE
2008
91views more  TSE 2008»
13 years 5 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra
COLCOM
2009
IEEE
13 years 10 months ago
Toward synchronization between decentralized orchestrations of composite web services
—Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation poin...
Walid Fdhila, Claude Godart
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
14 years 4 days ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung