Sciweavers

329 search results - page 38 / 66
» A Survey of Lightweight-Cryptography Implementations
Sort
View
ASPLOS
2012
ACM
12 years 3 months ago
Applying transactional memory to concurrency bugs
Multithreaded programs often suffer from synchronization bugs such as atomicity violations and deadlocks. These bugs arise from complicated locking strategies and ad hoc synchroni...
Haris Volos, Andres Jaan Tack, Michael M. Swift, S...
EVOW
2012
Springer
12 years 3 months ago
HyFlex: A Benchmark Framework for Cross-Domain Heuristic Search
This paper presents HyFlex, a software framework for the development of cross-domain search methodologies. The framework features a common software interface for dealing with diff...
Gabriela Ochoa, Matthew R. Hyde, Timothy Curtois, ...
ICSE
2012
IEEE-ACM
11 years 10 months ago
Debugger Canvas: Industrial experience with the code bubbles paradigm
—At ICSE 2010, the Code Bubbles team from Brown University and the Code Canvas team from Microsoft Research presented similar ideas for new user experiences for an integrated dev...
Robert DeLine, Andrew Bragdon, Kael Rowan, Jens Ja...
SEUS
2009
IEEE
14 years 2 months ago
Exploring the Design Space for Network Protocol Stacks on Special-Purpose Embedded Systems
Many special-purpose embedded systems such as automobiles and aircrafts consist of multiple embedded controllers connected through embedded network interconnects. Such network inte...
Hyun-Wook Jin, Junbeom Yoo
HICSS
2008
IEEE
133views Biometrics» more  HICSS 2008»
14 years 2 months ago
A Study of the Causal Relationship between IT Governance Inhibitors and Its Success in Korea Enterprises
In recent years, the emergence of the term IT Governance (ITG) has pointed to the increasing importance for business of effecting an alignment between its strategic direction and ...
Chi-Hoon Lee, Jung-Hoon Lee, Jong-Sung Park, Kap-Y...