Sciweavers

4029 search results - page 217 / 806
» Experience with Software Watermarking
Sort
View
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
15 years 10 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
146
Voted
GECCO
2004
Springer
117views Optimization» more  GECCO 2004»
15 years 10 months ago
Evaluating Evolutionary Testability with Software-Measurements
Test case design is the most important test activity with respect to test quality. For this reason, a large number of testing methods have been developed to assist the tester with ...
Frank Lammermann, André Baresel, Joachim We...
134
Voted
SC
2003
ACM
15 years 10 months ago
MRNet: A Software-Based Multicast/Reduction Network for Scalable Tools
We present MRNet, a software-based multicast/reduction network for building scalable performance and system administration tools. MRNet supports multiple simultaneous, asynchronou...
Philip C. Roth, Dorian C. Arnold, Barton P. Miller
GI
2003
Springer
15 years 10 months ago
New Software Technology in Space: BOSS - a Dependable Open Source Embedded Operating System
: BOSS targets a principle which the world forgot a long time ago: Simplicity. BOSS is an embedded real time operating system for safety critical applications. Our experience shows...
Sergio Montenegro
ICECCS
2002
IEEE
84views Hardware» more  ICECCS 2002»
15 years 10 months ago
An Empirical Comparison of Modularity of Procedural and Object-oriented Software
A commonly held belief is that applications written ina object-oriented languages are more modular than those written in procedural languages. This paper presents results from an ...
Lisa K. Ferrett, Jeff Offutt