Sciweavers

1143 search results - page 95 / 229
» Extraction in software watermarking
Sort
View
ASE
1999
90views more  ASE 1999»
13 years 8 months ago
A Concept Formation Based Approach to Object Identification in Procedural Code
Legacy software systems present a high level of entropy combined with imprecise documentation. This makes their maintenance more difficult, more time consuming, and costlier. In or...
Houari A. Sahraoui, Hakim Lounis, Walcélio ...
ISSTA
2012
ACM
11 years 11 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
ICMLA
2008
13 years 10 months ago
A Fully Automatic Crossword Generator
This paper presents a software system that is able to generate crosswords with no human intervention including definition generation and crossword compilation. In particular, the ...
Leonardo Rigutini, Michelangelo Diligenti, Marco M...
IRI
2008
IEEE
14 years 3 months ago
Gadget creation for personal information integration on web portals
Although the ever growing Web contain information to virtually every user’s query, it does not guarantee effectively accessing to those information. In many situations, the user...
Chia-Hui Chang, Shih-Feng Yang, Che-Min Liou, Moha...
IUI
2012
ACM
12 years 4 months ago
Summarizing sporting events using twitter
The status updates posted to social networks, such as Twitter and Facebook, contain a myriad of information about what people are doing and watching. During events, such as sports...
Jeffrey Nichols, Jalal Mahmud, Clemens Drews