نتایج جستجو برای: minute pirate bug

تعداد نتایج: 66771  

2011
Zhongxian Gu Earl T. Barr Zhendong Su

Some bugs, among the millions that exist, are similar to each other. When fixing a bug, a programmer tends to search for similar bugs that have been reported and resolved in the past. A fix for a similar bug can help him understand his bug, or even directly fix his bug. Studying bugs with similar symptoms, programmers may determine how to detect or resolve them. Existing work has focused on ana...

2010
Tao-Hsuan Chang Cheng-wei Chan Jane Yung-jen Hsu

Games With A Purpose (or GWAP) provide an effective way to collect data from web users. As the data grow over time, it becomes increasingly important to verify the data collected. This research explores the design of two games, Top10 and Pirate & Ghost, for verification of sentences in our Common Sense Knowledge Base (CSKB) collected via the Virtual Pets game. Top10 is a single-player game, in ...

2002
YUH-DAUH LYUU

We propose a fully public-key traitor-tracing scheme in which each subscriber can choose his or her own private decryption key without others learning the key. The distributor of the digital content utilizes the public data coming from all subscribers to compute a public encryption key. The paid contents are then transmitted to the subscribers, after being encrypted with the public key. Each su...

2003
Eitan Farchi Yarden Nir-Buchbinder Shmuel Ur

We present and categorize a taxonomy of concurrent bug patterns. We then use the taxonomy to create new timing heuristics for ConTest. Initial industrial experience indicates that these heuristics improve the bug finding ability of ConTest. We also show how concurrent bug patterns can be derived from concurrent design patterns. Further research is required to complete the concurrent bug taxonom...

2012
Ferdian Thung David Lo Lingxiao Jiang Foyzur Rahman Premkumar T. Devanbu

Not all bugs in software would be experienced and reported by end users right away: Some bugs manifest themselves quickly and may be reported by users a few days after they get into the code base; others manifest many months or even years later, and may only be experienced and reported by a small number of users. We refer to the period of time between the time when a bug is introduced into code...

Journal: :journal of agricultural science and technology 2015
m. mahmoudi a. sahragard h. pezhman m. ghadamyari

demographic analyses of dubas bug, ommatissus lybicus de bergevin, (hemiptera: tropiduchidae), reared on five date palm varieties (zahdi, mazafati, piarom, khasi, and shahani) were constructed under laboratory conditions at 27±1ºc, 70±5% rh, and a 14:10 hours (l: d) photoperiod. data were analyzed based on the age-stage, two-sex life table theory to take the variable developmental rate among in...

Journal: :IEEE transactions on image processing : a publication of the IEEE Signal Processing Society 2002
Jengnan Tzeng Wen-Liang Hwang I-Liang Chern

The watermarking method has emerged as an important tool for content tracing, authentication, and data hiding in multimedia applications. We propose a watermarking strategy in which the watermark of a host is selected from the robust features of the estimated forged images of the host. The forged images are obtained from Monte Carlo simulations of potential pirate attacks on the host image. The...

2016
Haidar Osman

Bug prediction is a technique used to estimate the most bug-prone entities in software systems. Bug prediction approaches vary in many design options, such as dependent variables, independent variables, and machine learning models. Choosing the right combination of design options to build an effective bug predictor is hard. Previous studies do not consider this complexity and draw conclusions b...

2006
Alan E. Woodfield

This paper generalizes the two-period model of Watt (2000) who demonstrates the possibility of optimal accommodation of a pirate when the royalty rate applying to a creation is uniform and second-period Cournot competition applies. Admitting nonlinear contracts with period-specific royalty rates that leave total payments unchanged, simulation analysis shows that a producer of originals does bet...

2005
John Patrick McGregor Yiqun Lisa Yin Ruby B. Lee

We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broadcast encryption systems by enabling the identification of authorized users known as traitors that contribute to unauthorized pirate decoders. In the proposed scheme, upon the confiscation of a pirate decoder created by a collu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید