Sciweavers

1285 search results - page 153 / 257
» Codes for Digital Recorders
Sort
View
223
Voted
IEPOL
2010
198views more  IEPOL 2010»
15 years 2 months ago
Music file sharing and sales displacement in the iTunes era
A growing empirical literature examines the relationship between music file sharing and legal purchases of music, but existing studies examine the period before consumers had attr...
Joel Waldfogel
CCS
2009
ACM
16 years 5 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
SAC
2009
ACM
15 years 11 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
GECCO
2009
Springer
103views Optimization» more  GECCO 2009»
15 years 11 months ago
Why evolution is not a good paradigm for program induction: a critique of genetic programming
We revisit the roots of Genetic Programming (i.e. Natural Evolution), and conclude that the mechanisms of the process of evolution (i.e. selection, inheritance and variation) are ...
John R. Woodward, Ruibin Bai
234
Voted
OOPSLA
2009
Springer
15 years 11 months ago
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations
An object diagram makes explicit the object structures that are only implicit in a class diagram. An object diagram may be missing and must extracted from the code. Alternatively,...
Marwan Abi-Antoun, Jonathan Aldrich