Sciweavers

2429 search results - page 244 / 486
» Using Aspects to Design a Secure System
Sort
View
117
Voted
MKM
2005
Springer
15 years 9 months ago
Determining Empirical Characteristics of Mathematical Expression Use
Abstract. Many processes in mathematical computing try to use knowledge of the most desired forms of mathematical expressions. This occurs, for example, in symbolic computation sys...
Clare M. So, Stephen M. Watt
AOSD
2006
ACM
15 years 9 months ago
Towards supporting on-demand virtual remodularization using program graphs
OOP style requires programmers to organize their code according to objects (or nouns, using natural language as a metaphor), causing a program’s actions (verbs) to become scatte...
David Shepherd, Lori L. Pollock, K. Vijay-Shanker
136
Voted
TVCG
2012
167views Hardware» more  TVCG 2012»
13 years 5 months ago
Wellformedness Properties in Euler Diagrams: Which Should Be Used?
— Euler diagrams are often used to visualize intersecting data sets in applications such as criminology; genetics, medicine and computer file systems. One interesting aspect of t...
Peter Rodgers, Leishi Zhang, Helen C. Purchase
115
Voted
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
115
Voted
ACSD
2005
IEEE
90views Hardware» more  ACSD 2005»
15 years 9 months ago
Extensible and Scalable Time Triggered Scheduling
The objective of this paper is to present how to design a system that can accommodate additional functionality with either no changes to the design or adding architectural modules...
Wei Zheng, Jike Chong, Claudio Pinello, Sri Kanaja...