Sciweavers

6740 search results - page 1298 / 1348
» Using Classification as a Programming Language
Sort
View
JMM2
2007
96views more  JMM2 2007»
14 years 9 months ago
Software Watermarking Resilient to Debugging Attacks
Abstract— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The softw...
Gaurav Gupta, Josef Pieprzyk
JSS
2007
115views more  JSS 2007»
14 years 9 months ago
A case study in re-engineering to enforce architectural control flow and data sharing
Without rigorous software development and maintenance, software tends to lose its original architectural structure and become difficult to understand and modify. ArchJava, a recen...
Marwan Abi-Antoun, Jonathan Aldrich, Wesley Coelho
CORR
2002
Springer
95views Education» more  CORR 2002»
14 years 9 months ago
Unsupervised Learning of Morphology without Morphemes
The first morphological learner based upon the theory of Whole Word Morphology (Ford et al., 1997) is outlined, and preliminary evaluation results are presented. The program, Whol...
Sylvain Neuvel, Sean A. Fulop
SOFTWARE
2002
14 years 9 months ago
Quality Attributes of Web Software Applications
In only four or five years, the world wide web has changed from a static collection of HTML web pages to a dynamic engine that powers e-commerce, collaborative work, and distribut...
A. Jefferson Offutt
KI
2012
Springer
13 years 5 months ago
Agreeing on Role Adoption in Open Organisations
The organisational specification of a multi-agent system supports agents’ effectiveness in attaining their purpose, or prevent certain undesired behaviour from occurring. This r...
Huib Aldewereld, Virginia Dignum, Catholijn M. Jon...
« Prev « First page 1298 / 1348 Last » Next »