Sciweavers

2409 search results - page 428 / 482
» Building Components from Functions
Sort
View
JMM2
2007
96views more  JMM2 2007»
13 years 10 months ago
Software Watermarking Resilient to Debugging Attacks
Abstract— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The softw...
Gaurav Gupta, Josef Pieprzyk
JECR
2002
120views more  JECR 2002»
13 years 10 months ago
Strategic Connectivity in Extended Enterprise Networks
Extended enterprises are networks of organizations interconnected to exchange critical resources, such as raw materials, labor, access to markets, specialized skills and knowledge...
John Tillquist
WEBI
2010
Springer
13 years 8 months ago
An Approach to Model and Predict the Popularity of Online Contents with Explanatory Factors
In this paper, we propose a methodology to predict the popularity of online contents. More precisely, rather than trying to infer the popularity of a content itself, we infer the l...
Jong Gun Lee, Sue Moon, Kavé Salamatian
VLSID
2007
IEEE
154views VLSI» more  VLSID 2007»
14 years 10 months ago
Model Based Test Generation for Microprocessor Architecture Validation
Functional validation of microprocessors is growing in complexity in current and future microprocessors. Traditionally, the different components (or validation collaterals) used i...
Sreekumar V. Kodakara, Deepak Mathaikutty, Ajit Di...
KDD
2009
ACM
228views Data Mining» more  KDD 2009»
14 years 10 months ago
A generalized Co-HITS algorithm and its application to bipartite graphs
Recently many data types arising from data mining and Web search applications can be modeled as bipartite graphs. Examples include queries and URLs in query logs, and authors and ...
Hongbo Deng, Michael R. Lyu, Irwin King