Sciweavers

4418 search results - page 148 / 884
» A Formal Approach to Computer Systems Requirements Documenta...
Sort
View
140
Voted
DAC
2006
ACM
15 years 10 months ago
Use of C/C++ models for architecture exploration and verification of DSPs
Architectural decisions for DSP modules are often analyzed using high level C models. Such high-level explorations allow early examination of the algorithms and the architectural ...
David Brier, Raj S. Mitra
128
Voted
SIGDOC
2009
ACM
15 years 11 months ago
The macro-structure of use of help
Users of help systems often complain that they do not find them useful; while they still use help at least occasionally, they resort to other problem-solving strategies. In this p...
Oscar D. Andrade, Nathaniel Bean, David G. Novick
NDSS
2009
IEEE
15 years 11 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
W4A
2005
ACM
15 years 10 months ago
Designing learning systems to provide accessible services
The need for providing learners with web-based learning content that match their accessibility needs and preferences, as well as providing ways to match learning content to userâ€...
Pythagoras Karampiperis, Demetrios G. Sampson
181
Voted
SAS
1994
Springer
159views Formal Methods» more  SAS 1994»
15 years 8 months ago
Iterative Fixed Point Computation for Type-Based Strictness Analysis
Amtoft has formulated an "on-line" constraint normalization method for solving a strictness inference problem inspired by Wright. From the syntactic form of the normaliz...
Fritz Henglein