Sciweavers

439 search results - page 42 / 88
» Identification of Software Instabilities
Sort
View
106
Voted
DRMTICS
2005
Springer
15 years 8 months ago
Call Tree Transformation for Program Obfuscation and Copy Protection
In this paper we propose a new scheme for software obfuscation and license protection that is based on an original transformation of the program’s call tree. The idea is based on...
Valery Pryamikov
129
Voted
HICSS
2002
IEEE
119views Biometrics» more  HICSS 2002»
15 years 7 months ago
Task-Structure Analysis: A Modularized Approach for Modeling Knowledge Intensive Processes
Modular design methodologies, which decompose large and complex systems into components that are relatively easy to develop and maintain, have been widely adopted in the software ...
Roman M. Wong, Siddhartha Bhattacharyya
113
Voted
CODES
1996
IEEE
15 years 6 months ago
Partitioning and Exploration Strategies in the TOSCA Co-Design Flow
The TaSCA environment for hardware/software co-design of control dominated systems implemented on a single chip includes a novel approach to the system exploration phase for the e...
Alessandro Balboni, William Fornaciari, Donatella ...
108
Voted
AAAI
1996
15 years 4 months ago
Monitoring Frog Communities: An Application of Machine Learning
Automatic recognition of animal vocalisations would be a valuable tool for a variety of biological research and environmental monitoring applications . We report the development o...
Andrew Taylor, Graeme Watson, Gordon Grigg, Hamish...
110
Voted
TSE
2002
96views more  TSE 2002»
15 years 2 months ago
Better Reliability Assessment and Prediction through Data Clustering
This paper presents a new approach to software reliability modeling by grouping data into clusters of homogeneous failure intensities. This series of data clusters associated with...
Jeff Tian