Sciweavers

6978 search results - page 61 / 1396
» Reframing Requirements Analysis
Sort
View
IEEEHPCS
2010
13 years 5 months ago
Robust lossless data hiding: Analysis and evaluation
Robust lossless data hiding (LDH) methods have attracted more and more attentions for copyright protection of multimedia in lossy environment. One of the important requirements of...
Lingling An, Xinbo Gao, Cheng Deng, Feng Ji
ESORICS
2011
Springer
12 years 10 months ago
A Systematic Analysis of XSS Sanitization in Web Application Frameworks
While most research on XSS defense has focused on techniques for securing existing applications and re-architecting browser mechanisms, sanitization remains the industry-standard d...
Joel Weinberger, Prateek Saxena, Devdatta Akhawe, ...
CSCW
2012
ACM
12 years 5 months ago
Building for social translucence: a domain analysis and prototype system
The relationships and work that facilitate content creation in large online contributor system are not always visible. Social translucence is a stance toward the design of systems...
David W. McDonald, Stephanie Gokhman, Mark Zachry
SAC
2011
ACM
13 years 1 months ago
Fault tolerance evaluation and schedulability analysis
The use of real-time systems can differ from their initial design and requirements. New missions may take place in a more agressive environment and cause faults that are not manag...
Florian Many, David Doose
WCET
2010
13 years 8 months ago
A Code Policy Guaranteeing Fully Automated Path Analysis
Calculating the worst-case execution time (WCET) of real-time tasks is still a tedious job. Programmers are required to provide additional information on the program flow, analyzi...
Benedikt Huber, Peter P. Puschner