Sciweavers

2701 search results - page 408 / 541
» Evaluation Issues
Sort
View
ECR
2006
107views more  ECR 2006»
15 years 5 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
IIE
2008
104views more  IIE 2008»
15 years 5 months ago
Exploring Technologies, Materials, and Methods for an Online Foundational Programming Course
Introductory computer programming courses are inherently challenging for a variety of reasons. With increased demands for online delivery, the use of effective technologies, materi...
Eman El-Sheikh, John W. Coffey, Laura J. White
IJSNET
2008
115views more  IJSNET 2008»
15 years 5 months ago
Event-driven sensor deployment using self-organizing maps
: Coverage is an important optimization objective in pre and post-deployment stage of a Wireless Sensor Network (WSN). In this paper, we address the issue of placing a finite set o...
Cris Koutsougeras, Yi Liu, Rong Zheng
IEICET
2006
114views more  IEICET 2006»
15 years 5 months ago
Synchronization Verification in System-Level Design with ILP Solvers
Concurrency is one of the most important issues in system-level design. Interleaving among parallel processes can cause an extremely large number of different behaviors, making de...
Thanyapat Sakunkonchak, Satoshi Komatsu, Masahiro ...
CN
2007
141views more  CN 2007»
15 years 5 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...