Sciweavers

62 search results - page 8 / 13
» Trade-Off Traitor Tracing
Sort
View
122
Voted
TELSYS
2010
76views more  TELSYS 2010»
14 years 10 months ago
Traitor tracing over YouTube video service - proof of concept
Joan Tomàs-Buliart, Marcel Fernandez, Migue...
129
Voted
TC
2010
15 years 2 months ago
Architecture Exploration of High-Performance PCs with a Solid-State Disk
—As the cost per bit of NAND flash memory devices rapidly decreases, NAND-flash-based Solid-State Disks (SSDs) are replacing Hard Disk Drives (HDDs) used in a wide spectrum of co...
Dong Kim, Kwanhu Bang, Seung-Hwan Ha, Sungroh Yoon...
ICICS
2003
Springer
15 years 9 months ago
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks t...
Yongdong Wu, Robert H. Deng
126
Voted
SIGSOFT
2005
ACM
16 years 4 months ago
Arithmetic program paths
We present Arithmetic Program Paths, a novel, efficient way to compress program control-flow traces that reduces program bit traces to less than a fifth of their original size whi...
Manos Renieris, Shashank Ramaprasad, Steven P. Rei...
142
Voted
KBSE
2005
IEEE
15 years 9 months ago
Determining the cost-quality trade-off for automated software traceability
Major software development standards mandate the establishment of trace links among software artifacts such as requirements, architectural elements, or source code without explici...
Alexander Egyed, Stefan Biffl, Matthias Heindl, Pa...