Traditional requirements engineering approaches suffer from the tyranny of the dominant decomposition, with functional requirements serving as the base decomposition and non-functi...
Abstract. Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random...
There is a broad use of the term "paradigm" in Software Engineering. Concepts such as structured paradigm, cascade paradigm or agent-oriented paradigm are very frequent i...
This paper highlights some of the issues that have been reported in surveys carried out by the RIOJA (Repository Interface for Overlaid JournalArchives) project (http://www.ucl.ac...
Visual metaphors describe cognitive processes in every part of life and function as a connection between what we see and what we think. Mental activities and perceptional interact...