Sciweavers

464 search results - page 56 / 93
» Privacy Engineering for Digital Rights Management Systems
Sort
View
111
Voted
ASPLOS
2008
ACM
15 years 2 months ago
Tapping into the fountain of CPUs: on operating system support for programmable devices
The constant race for faster and more powerful CPUs is drawing to a close. No longer is it feasible to significantly increase the speed of the CPU without paying a crushing penalt...
Yaron Weinsberg, Danny Dolev, Tal Anker, Muli Ben-...
111
Voted
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
15 years 6 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
93
Voted
WISE
2009
Springer
15 years 9 months ago
Aggregation of Document Frequencies in Unstructured P2P Networks
Peer-to-peer (P2P) systems have been recently proposed for providing search and information retrieval facilities over distributed data sources, including web data. Terms and their ...
Robert Neumayer, Christos Doulkeridis, Kjetil N&os...
87
Voted
KBSE
2007
IEEE
15 years 6 months ago
Direct-dependency-based software compatibility testing
Software compatibility testing is an important quality assurance task aimed at ensuring that component-based software systems build and/or execute properly across a broad range of...
Il-Chul Yoon, Alan Sussman, Atif M. Memon, Adam A....
132
Voted
AC
2008
Springer
15 years 18 days ago
Computing with RFID- Drivers, Technology and Implications
Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple p...
George Roussos