Sciweavers

1483 search results - page 277 / 297
» An Analysis of Factors Used in Search Engine Ranking
Sort
View
ISSTA
2010
ACM
14 years 15 days ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
CODES
2006
IEEE
14 years 2 months ago
Fuzzy decision making in embedded system design
The use of Application Specific Instruction-set Processors (ASIP) is a solution to the problem of increasing complexity in embedded systems design. One of the major challenges in...
Alessandro G. Di Nuovo, Maurizio Palesi, Davide Pa...
INFOCOM
2003
IEEE
14 years 1 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
GIS
2008
ACM
13 years 9 months ago
Combining 3-D geovisualization with force feedback driven user interaction
We describe a prototype software system for investigating novel human-computer interaction techniques for 3-D geospatial data. This system, M4-Geo (Multi-Modal Mesh Manipulation o...
Adam Faeth, Michael Oren, Chris Harding
CSCW
2011
ACM
13 years 3 months ago
"Not my bug!" and other reasons for software bug report reassignments
Bug reporting/fixing is an important social part of the software development process. The bug-fixing process inherently has strong inter-personal dynamics at play, especially in h...
Philip J. Guo, Thomas Zimmermann, Nachiappan Nagap...