Sciweavers

439 search results - page 42 / 88
» Identification of Software Instabilities
Sort
View
DRMTICS
2005
Springer
14 years 1 months ago
Call Tree Transformation for Program Obfuscation and Copy Protection
In this paper we propose a new scheme for software obfuscation and license protection that is based on an original transformation of the program’s call tree. The idea is based on...
Valery Pryamikov
HICSS
2002
IEEE
119views Biometrics» more  HICSS 2002»
14 years 23 days ago
Task-Structure Analysis: A Modularized Approach for Modeling Knowledge Intensive Processes
Modular design methodologies, which decompose large and complex systems into components that are relatively easy to develop and maintain, have been widely adopted in the software ...
Roman M. Wong, Siddhartha Bhattacharyya
CODES
1996
IEEE
13 years 12 months ago
Partitioning and Exploration Strategies in the TOSCA Co-Design Flow
The TaSCA environment for hardware/software co-design of control dominated systems implemented on a single chip includes a novel approach to the system exploration phase for the e...
Alessandro Balboni, William Fornaciari, Donatella ...
AAAI
1996
13 years 9 months ago
Monitoring Frog Communities: An Application of Machine Learning
Automatic recognition of animal vocalisations would be a valuable tool for a variety of biological research and environmental monitoring applications . We report the development o...
Andrew Taylor, Graeme Watson, Gordon Grigg, Hamish...
TSE
2002
96views more  TSE 2002»
13 years 7 months ago
Better Reliability Assessment and Prediction through Data Clustering
This paper presents a new approach to software reliability modeling by grouping data into clusters of homogeneous failure intensities. This series of data clusters associated with...
Jeff Tian