Sciweavers

416 search results - page 14 / 84
» Some new approaches for preventing software tampering
Sort
View
ICSM
2002
IEEE
15 years 6 months ago
Measuring Software Functional Size: Towards an Effective Measurement of Complexity
Data manipulation, or algorithmic complexity, is not taken into account adequately in any of the most popular functional size measurement methods. In this paper, we recall some we...
De Tran-Cao, Ghislain Lévesque, Alain Abran
ICWE
2007
Springer
15 years 7 months ago
Transparent Interface Composition in Web Applications
Abstract. In this paper we present an approach for oblivious composition of Web user interfaces, particularly for volatile functionality. Our approach, which is inspired on well-kn...
Jeronimo Ginzburg, Gustavo Rossi, Matias Urbieta, ...
TIFS
2008
148views more  TIFS 2008»
15 years 1 months ago
Digital Image Forensics via Intrinsic Fingerprints
Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity a...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
SIGUCCS
2000
ACM
15 years 5 months ago
Approaches to Computer Lab Management: Lockdown vs. Freedom
Basic approaches to computer lab management range along a spectrum from total lockdown of lab computers to total freedom. Total lockdown, which can be implemented with system perm...
Christopher Jones, Yasemin Tunc, Deborah Cherry
CAV
2005
Springer
173views Hardware» more  CAV 2005»
15 years 7 months ago
Building Your Own Software Model Checker Using the Bogor Extensible Model Checking Framework
Model checking has proven to be an effective technology for verification and debugging in hardware and more recently in software domains. We believe that recent trends in both th...
Matthew B. Dwyer, John Hatcliff, Matthew Hoosier, ...