Sciweavers

416 search results - page 55 / 84
» Some new approaches for preventing software tampering
Sort
View
CCR
2004
143views more  CCR 2004»
14 years 11 months ago
The cutting EDGE of IP router configuration
Abstract-- Human error in configuring routers undermines attempts to provide reliable, predictable end-to-end performance on IP networks. Manual configuration, while expensive and ...
Donald F. Caldwell, Anna Gilbert, Joel Gottlieb, A...
TSMC
2010
14 years 6 months ago
Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions
Feature-based image watermarking schemes, which aim to survive various geometric distortions, have attracted great attention in recent years. Existing schemes have shown robustness...
Xinbo Gao, Cheng Deng, Xuelong Li, Dacheng Tao
IWC
2011
111views more  IWC 2011»
14 years 6 months ago
Socio-technical systems: From design methods to systems engineering
The importance of adopting a socio-technical approach to system development is recognised by many but not widely practised. We analyse the reasons for this, considering the histor...
Gordon D. Baxter, Ian Sommerville
106
Voted
SIGMOD
2010
ACM
215views Database» more  SIGMOD 2010»
15 years 3 months ago
Dynamic symbolic database application testing
A database application differs form regular applications in that some of its inputs may be database queries. The program will execute the queries on a database and may use any re...
Chengkai Li, Christoph Csallner
AGILEDC
2007
IEEE
15 years 6 months ago
Agile Architecture - Changing Application Servers
Some projects are simply too big to finish on the release schedule that you want to maintain. Rally’s agile engineering team delivered a very disruptive architectural change las...
Veljko Krunic