Sciweavers

905 search results - page 39 / 181
» The Case Against Micropayments
Sort
View
AUTOMATICA
2008
78views more  AUTOMATICA 2008»
13 years 8 months ago
Exact determinations of the maximal output admissible set for a class of nonlinear systems
This paper is concerned with obtaining necessary and sufficient conditions for fulfilling specified state and control pointwise-in-time constraints against a certain class of nonli...
Kenji Hirata, Yoshito Ohta
IJNSEC
2006
122views more  IJNSEC 2006»
13 years 7 months ago
A Hash-based Strong Password Authentication Protocol with User Anonymity
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that t...
Kumar V. Mangipudi, Rajendra S. Katti
IJNSEC
2007
193views more  IJNSEC 2007»
13 years 7 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
ISPW
2009
IEEE
14 years 2 months ago
On the Relative Merits of Software Reuse
Abstract. Using process simulation and AI search methods, we compare software reuse against other possible changes to a project. such as reducing functionality or improving the ski...
Andres S. Orrego, Tim Menzies, Oussama El-Rawas
CSMR
2008
IEEE
14 years 2 months ago
Visual Detection of Design Anomalies
Design anomalies, introduced during software evolution, are frequent causes of low maintainability and low flexibility to future changes. Because of the required knowledge, an im...
Karim Dhambri, Houari A. Sahraoui, Pierre Poulin