Sciweavers

2236 search results - page 156 / 448
» Secure Software Design in Practice
Sort
View
CSCW
2012
ACM
13 years 11 months ago
Social coding in GitHub: transparency and collaboration in an open software repository
Social applications on the web let users track and follow the activities of a large number of others regardless of location or affiliation. There is a potential for this transpare...
Laura A. Dabbish, H. Colleen Stuart, Jason Tsay, J...
WCRE
2003
IEEE
15 years 9 months ago
Identification of Software Instabilities
As software evolves, maintenance practices require a process of accommodating changing requirements while minimizing the cost of implementing those changes. Over time, incompatibi...
Jennifer Bevan, E. James Whitehead Jr.
JCDL
2010
ACM
238views Education» more  JCDL 2010»
15 years 9 months ago
BinarizationShop: a user-assisted software suite for converting old documents to black-and-white
Converting a scanned document to a binary format (black and white) is a key step in the digitization process. While many existing binarization algorithms operate robustly for well...
Fanbo Deng, Zheng Wu, Zheng Lu, Michael S. Brown
137
Voted
WDAG
2005
Springer
103views Algorithms» more  WDAG 2005»
15 years 9 months ago
Adaptive Software Transactional Memory
Software Transactional Memory (STM) is a generic synchronization construct that enables automatic conversion of correct sequential objects into correct nonblocking concurrent obje...
Virendra J. Marathe, William N. Scherer III, Micha...
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 10 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...