Sciweavers

3639 search results - page 667 / 728
» Provenance as Dependency Analysis
Sort
View
CCS
2009
ACM
15 years 4 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
CCS
2009
ACM
15 years 4 months ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
ESOP
2009
Springer
15 years 4 months ago
An Interval-Based Inference of Variant Parametric Types
Abstract. Variant parametric types (VPT) represent the successful result of combining subtype polymorphism with parametric polymorphism to support a more flexible subtyping for Ja...
Florin Craciun, Wei-Ngan Chin, Guanhua He, Shengch...
ICAS
2009
IEEE
168views Robotics» more  ICAS 2009»
15 years 4 months ago
Impact of Video Content on Video Quality for Video over Wireless Networks
—Video streaming is a promising multimedia application and is gaining popularity over wireless/mobile communications. The quality of the video depends heavily on the type of cont...
Asiya Khan, Lingfen Sun, Emmanuel C. Ifeachor
ICST
2009
IEEE
15 years 4 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams