Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, s...
The fundamental challenge for social computing is to contribute to fostering communities in which humans can transcend the limitation of the unaided, individual human mind by help...
For the past 40 years, the techniques, processes and methods of software development have been dominated by supply-side issues, giving rise to a software industry oriented towards...
Keith H. Bennett, Paul J. Layzell, David Budgen, P...
The Verified Software Repository is dedicated to a long-term vision of a future in which all computer systems justify the trust that Society increasingly places in them. This will ...
Juan Bicarregui, C. A. R. Hoare, J. C. P. Woodcock
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...