Sciweavers

2912 search results - page 409 / 583
» A Study of Collaboration in Software Design
Sort
View
CGO
2009
IEEE
14 years 4 months ago
Techniques for Region-Based Register Allocation
—Register allocation is an important component of every compiler and numerous studies have investigated ways to improve allocation quality or reduce allocation time. However, tec...
Ivan D. Baev
ICALP
2009
Springer
14 years 4 months ago
Assigning Papers to Referees
Refereed conferences require every submission to be reviewed by members of a program committee (PC) in charge of selecting the conference program. There are many software packages...
Kurt Mehlhorn
IPPS
2009
IEEE
14 years 4 months ago
EmBOINC: An emulator for performance analysis of BOINC projects
BOINC is a platform for volunteer computing. The server component of BOINC embodies a number of scheduling policies and parameters that have a large impact on the projects through...
Trilce Estrada, Michela Taufer, Kevin Reed, David ...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 3 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
AUIC
2006
IEEE
14 years 3 months ago
Evaluation of a universal interaction and control device for use within multiple heterogeneous display ubiquitous environments
This paper provides an insight into the usability of our Universal Interaction Controller (UIC), a user interface device designed to support interactions in ubiquitous computing e...
Hannah Slay, Bruce H. Thomas