Sciweavers

1143 search results - page 36 / 229
» Extraction in software watermarking
Sort
View
SAC
2010
ACM
14 years 2 months ago
Extraction of component-environment interaction model using state space traversal
Scalability of software engineering methods can be improved by application of the methods to individual components instead of complete systems. This is, however, possible only if ...
Pavel Parizek, Nodir Yuldashev
IH
2007
Springer
14 years 1 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
ICSE
2000
IEEE-ACM
13 years 11 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
ICMCS
1999
IEEE
118views Multimedia» more  ICMCS 1999»
13 years 12 months ago
Evaluation of Copyright Marking Systems
Hidden copyright marks have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia objects. Many systems have been...
Fabien A. P. Petitcolas, Ross J. Anderson
WCRE
2006
IEEE
14 years 1 months ago
Extracting Change-patterns from CVS Repositories
Often, the only sources of information about the evolution of software systems are the systems themselves and their histories. Version control repositories contain information on ...
Salah Bouktif, Yann-Gaël Guéhén...