Sciweavers

7393 search results - page 377 / 1479
» Synthesis-for-testability using transformations
Sort
View
IEEEIAS
2007
IEEE
15 years 11 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
IPPS
2007
IEEE
15 years 11 months ago
Scheduling in the Z-Polyhedral Model
The polyhedral model is extensively used for analyses and transformations of regular loop programs, one of the most important being automatic parallelization. The model, however, ...
Gautam Gupta, DaeGon Kim, Sanjay V. Rajopadhye
143
Voted
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
15 years 10 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
ER
2004
Springer
89views Database» more  ER 2004»
15 years 10 months ago
Elementary Translations: The Seesaws for Achieving Traceability Between Database Schemata
There exist several recent approaches that leverages the use of model transformations during software development. The existence erent kinds of models, at different levels of abst...
Eladio Domínguez, Jorge Lloret, Angel Luis ...
FASE
2009
Springer
15 years 8 months ago
Object Flow Definition for Refined Activity Diagrams
Activity diagrams are a well-known means to model the control flow of system behavior. Their expressiveness can be enhanced by using their object flow notation. In addition, we ref...
Stefan Jurack, Leen Lambers, Katharina Mehner, Gab...