In this paper, we discuss the advantages and disadvantages of using network simulators to teach networking concepts versus having students write programs. The authors have experie...
In this work, we develop a secret sharing based compiler solution to achieve confidentiality, integrity and availability (intrusion tolerance) of critical data together, rather th...
Abstract— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The softw...
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
The paper presents a lossless coding method based on predictor blending approach that codes nine widely used benchmark images with the lowest average bitrate ever published. At th...