نتایج جستجو برای: minute pirate bug
تعداد نتایج: 66771 فیلتر نتایج به سال:
Some bugs, among the millions that exist, are similar to each other. When fixing a bug, a programmer tends to search for similar bugs that have been reported and resolved in the past. A fix for a similar bug can help him understand his bug, or even directly fix his bug. Studying bugs with similar symptoms, programmers may determine how to detect or resolve them. Existing work has focused on ana...
Games With A Purpose (or GWAP) provide an effective way to collect data from web users. As the data grow over time, it becomes increasingly important to verify the data collected. This research explores the design of two games, Top10 and Pirate & Ghost, for verification of sentences in our Common Sense Knowledge Base (CSKB) collected via the Virtual Pets game. Top10 is a single-player game, in ...
We propose a fully public-key traitor-tracing scheme in which each subscriber can choose his or her own private decryption key without others learning the key. The distributor of the digital content utilizes the public data coming from all subscribers to compute a public encryption key. The paid contents are then transmitted to the subscribers, after being encrypted with the public key. Each su...
We present and categorize a taxonomy of concurrent bug patterns. We then use the taxonomy to create new timing heuristics for ConTest. Initial industrial experience indicates that these heuristics improve the bug finding ability of ConTest. We also show how concurrent bug patterns can be derived from concurrent design patterns. Further research is required to complete the concurrent bug taxonom...
Not all bugs in software would be experienced and reported by end users right away: Some bugs manifest themselves quickly and may be reported by users a few days after they get into the code base; others manifest many months or even years later, and may only be experienced and reported by a small number of users. We refer to the period of time between the time when a bug is introduced into code...
demographic analyses of dubas bug, ommatissus lybicus de bergevin, (hemiptera: tropiduchidae), reared on five date palm varieties (zahdi, mazafati, piarom, khasi, and shahani) were constructed under laboratory conditions at 27±1ºc, 70±5% rh, and a 14:10 hours (l: d) photoperiod. data were analyzed based on the age-stage, two-sex life table theory to take the variable developmental rate among in...
The watermarking method has emerged as an important tool for content tracing, authentication, and data hiding in multimedia applications. We propose a watermarking strategy in which the watermark of a host is selected from the robust features of the estimated forged images of the host. The forged images are obtained from Monte Carlo simulations of potential pirate attacks on the host image. The...
Bug prediction is a technique used to estimate the most bug-prone entities in software systems. Bug prediction approaches vary in many design options, such as dependent variables, independent variables, and machine learning models. Choosing the right combination of design options to build an effective bug predictor is hard. Previous studies do not consider this complexity and draw conclusions b...
This paper generalizes the two-period model of Watt (2000) who demonstrates the possibility of optimal accommodation of a pirate when the royalty rate applying to a creation is uniform and second-period Cournot competition applies. Admitting nonlinear contracts with period-specific royalty rates that leave total payments unchanged, simulation analysis shows that a producer of originals does bet...
We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broadcast encryption systems by enabling the identification of authorized users known as traitors that contribute to unauthorized pirate decoders. In the proposed scheme, upon the confiscation of a pirate decoder created by a collu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید