Sciweavers

1143 search results - page 75 / 229
» Extraction in software watermarking
Sort
View
CSMR
2003
IEEE
14 years 1 months ago
CodeCrawler - Lessons Learned in Building a Software Visualization Tool
Software visualization tools face many challenges in terms of their implementation, including scalability, usability, adaptability, and durability. Such tools, like many other res...
Michele Lanza
ICSE
1999
IEEE-ACM
14 years 2 hour ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
DAGSTUHL
2007
13 years 9 months ago
Block and Stream Ciphers and the Creatures in Between
In this paper we define a notion of leak extraction from a block cipher. We demonstrate this new concept on an example of AES. A result is LEX: a simple AES-based stream cipher wh...
Alex Biryukov
FASE
2007
Springer
14 years 1 months ago
EQ-Mine: Predicting Short-Term Defects for Software Evolution
We use 63 features extracted from sources such as versioning and issue tracking systems to predict defects in short time frames of two months. Our multivariate approach covers aspe...
Jacek Ratzinger, Martin Pinzger, Harald Gall
WCRE
1998
IEEE
13 years 12 months ago
Requirements for Integrating Software Architecture and Reengineering Models: CORUM II
This paper discusses the requirements and a generic framework for the integration of architectural and codebased reengineering tools. This framework is needed because there is a l...
Rick Kazman, Steven S. Woods, S. Jeromy Carri&egra...