Sciweavers

1143 search results - page 36 / 229
» Extraction in software watermarking
Sort
View
SAC
2010
ACM
15 years 10 months ago
Extraction of component-environment interaction model using state space traversal
Scalability of software engineering methods can be improved by application of the methods to individual components instead of complete systems. This is, however, possible only if ...
Pavel Parizek, Nodir Yuldashev
IH
2007
Springer
15 years 9 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
ICSE
2000
IEEE-ACM
15 years 6 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
ICMCS
1999
IEEE
118views Multimedia» more  ICMCS 1999»
15 years 7 months ago
Evaluation of Copyright Marking Systems
Hidden copyright marks have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia objects. Many systems have been...
Fabien A. P. Petitcolas, Ross J. Anderson
WCRE
2006
IEEE
15 years 9 months ago
Extracting Change-patterns from CVS Repositories
Often, the only sources of information about the evolution of software systems are the systems themselves and their histories. Version control repositories contain information on ...
Salah Bouktif, Yann-Gaël Guéhén...