Sciweavers

1489 search results - page 148 / 298
» The First Bug Report
Sort
View
IJNSEC
2008
107views more  IJNSEC 2008»
15 years 4 months ago
Short Designated Verifier Signature Scheme and Its Identity-based Variant
The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
PR
2008
146views more  PR 2008»
15 years 4 months ago
Retrieval of machine-printed Latin documents through Word Shape Coding
This paper reports a document retrieval technique that retrieves machine-printed Latin-based document images through word shape coding. Adopting the idea of image annotation, a wo...
Shijian Lu, Chew Lim Tan
TCAD
2008
114views more  TCAD 2008»
15 years 4 months ago
Word-Level Predicate-Abstraction and Refinement Techniques for Verifying RTL Verilog
el Predicate Abstraction and Refinement Techniques for Verifying RTL Verilog Himanshu Jain, Daniel Kroening, Natasha Sharygina, and Edmund M. Clarke, Fellow, IEEE As a first step, ...
Himanshu Jain, Daniel Kroening, Natasha Sharygina,...
CLEIEJ
2000
101views more  CLEIEJ 2000»
15 years 4 months ago
Keeping the Software Documentation Up to Date in Small Companies
Software configuration management is one of the first requirements to achieve quality in the software process. However, these activities are very difficult to be introduced, mainl...
Renato Ferrari Pacheco, Rosely Sanches
ACSAC
2010
IEEE
15 years 2 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria