Sciweavers

3428 search results - page 115 / 686
» Making the Case
Sort
View
WETICE
2006
IEEE
15 years 4 months ago
Exploiting the TTL Rule in Unstructured Peer-to-Peer Networks
Peer-to-Peer networks exist with the volunteering cooperation of various entities on the Internet. Their self-structure nature has the important characteristic that they make no u...
Georgios Pitsilis, Panayiotis Periorellis
78
Voted
FM
2005
Springer
132views Formal Methods» more  FM 2005»
15 years 4 months ago
Decoupling in Object Orientation
In formal design, decoupling means to make the features of a formal system as independent as possible from each other. Decoupling tends to make the features semantically more primi...
Ioannis T. Kassios
75
Voted
IH
2005
Springer
15 years 4 months ago
A General Framework for Structural Steganalysis of LSB Replacement
There are many detectors for simple Least Significant Bit (LSB) steganography in digital images, the most sensitive of which make use of structural or combinatorial properties of ...
Andrew D. Ker
ER
2004
Springer
96views Database» more  ER 2004»
15 years 4 months ago
Risk-Driven Conceptual Modeling of Outsourcing Decisions
Abstract. In the current networked world, outsourcing of information technology or even of entire business processes is often a prominent design alternative. In the general case, o...
Pascal van Eck, Roel Wieringa, Jaap Gordijn
IWPC
2003
IEEE
15 years 4 months ago
Using Run-Time Data for Program Comprehension
Traditional approaches for program comprehension use static program analysis or dynamic program analysis in the form of execution traces. Our approach, however, makes use of runti...
Thomas Gschwind, Johann Oberleitner, Martin Pinzge...