Sciweavers

4790 search results - page 308 / 958
» Reverse Query Processing
Sort
View
121
Voted
IH
2007
Springer
15 years 9 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
140
Voted
WCRE
2006
IEEE
15 years 9 months ago
Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study
Requirements views, such as coverage and status views, are an important asset for monitoring and managing software development. We have developed a method that automates the proce...
Marco Lormans, Hans-Gerhard Groß, Arie van D...
PASTE
2005
ACM
15 years 9 months ago
String analysis for x86 binaries
Information about string values at key points in a program can help program understanding, reverse engineering, and forensics. We present a static-analysis technique for recoverin...
Mihai Christodorescu, Nicholas Kidd, Wen-Han Goh
120
Voted
SAC
2004
ACM
15 years 9 months ago
A multi-criteria model for electronic auctions
In this paper we present a multi-criteria model for electronic auctions, which is based on reference points. According to the model, the buyer must specify an aspiration point tha...
Marie-Jo Bellosta, Imène Brigui, Sylvie Kor...
ISW
2004
Springer
15 years 8 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg