Side Effects Are Not Sufficient to Authenticate Software.
Umesh ShankarMonica ChewJ. D. TygarPublished in: USENIX Security Symposium (2004)
Keyphrases
- software tools
- software systems
- software development
- software design
- website
- machine learning
- knowledge base
- software developers
- evolutionary algorithm
- computer systems
- computer based instruction
- data flow
- data processing
- user interface
- information technology
- expert systems
- case study
- information systems
- computer vision