Sciweavers

4029 search results - page 91 / 806
» Experience with Software Watermarking
Sort
View
ICSE
2008
IEEE-ACM
14 years 11 months ago
On the difficulty of replicating human subjects studies in software engineering
Replications play an important role in verifying empirical results. In this paper, we discuss our experiences performing a literal replication of a human subjects experiment that ...
Jonathan Lung, Jorge Aranda, Steve M. Easterbrook,...
ICSE
2000
IEEE-ACM
14 years 1 months ago
Producing more reliable software: mature software engineering process vs. state-of-the-art technology?
: Producing More Reliable Software: Mature Software Engineering Process vs. State-of-the-Art Technology? A customer of high assurance software recently sponsored a software enginee...
James C. Widmaier
ACE
2004
222views Education» more  ACE 2004»
13 years 11 months ago
Learning about Software Development - Should Programming Always Come First?
The issues surrounding curriculum design of many Computer Science and Software Engineering degree programs1 are many and complex. In particular, the question of whether prior prog...
Margaret Hamilton, Liz Haywood
ICIP
2004
IEEE
14 years 11 months ago
Robust perceptual image hashing via matrix invariants
In this paper we suggest viewing images (as well as attacks on them) as a sequence of linear operators and propose novel hashing algorithms employing transforms that are based on ...
Mehmet Kivanç Mihçak, Ramarathnam Ve...
CCS
2003
ACM
14 years 3 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves