Sciweavers

406 search results - page 25 / 82
» Identifying Codes and Covering Problems
Sort
View
56
Voted
IFIP
1994
Springer
15 years 1 months ago
Hidden Safety Requirements in Large-Scale Systems
To avoid hidden safety problems in future large scale systems, we must be able to identify the crucial assumptions underlying the development of their components and to enunciate ...
Carl E. Landwehr
79
Voted
POPL
1999
ACM
15 years 2 months ago
Software Watermarking: Models and Dynamic Embeddings
Watermarking embeds a secret message into a cover message. In media watermarking the secret is usually a copyright notice and the cover a digital image. Watermarking an object dis...
Christian S. Collberg, Clark D. Thomborson
WORDS
2002
IEEE
15 years 2 months ago
Writing Temporally Predictable Code
The Worst-Case Execution-Time Analysis (WCET Analysis) of program code that is to be executed on modern processors is a highly complex task. First, it involves path analysis, to i...
Peter P. Puschner, Alan Burns
ICSE
2010
IEEE-ACM
15 years 2 months ago
A degree-of-knowledge model to capture source code familiarity
The size and high rate of change of source code comprising a software system make it difficult for software developers to keep up with who on the team knows about particular parts...
Thomas Fritz, Jingwen Ou, Gail C. Murphy, Emerson ...
88
Voted
WCC
2005
Springer
130views Cryptology» more  WCC 2005»
15 years 3 months ago
On the Design of Codes for DNA Computing
In this paper, we describe a broad class of problems arising in the context of designing codes for DNA computing. We primarily focus on design considerations pertaining to the phen...
Olgica Milenkovic, Navin Kashyap