Sciweavers

85 search results - page 9 / 17
» Code Roots
Sort
View
IWPC
2003
IEEE
14 years 22 days ago
Comprehending Reality - Practical Barriers to Industrial Adoption of Software Maintenance Automation
Recent years have seen many significant advances in program comprehension and software maintenance automation technology. In spite of the enormous potential savings in software ma...
James R. Cordy
ESORICS
2003
Springer
14 years 20 days ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
AAECC
2006
Springer
133views Algorithms» more  AAECC 2006»
13 years 7 months ago
On the low hamming weight discrete logarithm problem for nonadjacent representations
So-called nonadjacent representations are commonly used in elliptic curve cryptography to facilitate computing a scalar multiple of a point on an elliptic curve. A nonadjacent rep...
James A. Muir, Douglas R. Stinson
CHI
2007
ACM
14 years 7 months ago
Let's go to the whiteboard: how and why software developers use drawings
Software developers are rooted in the written form of their code, yet they often draw diagrams representing their code. Unfortunately, we still know little about how and why they ...
Mauro Cherubini, Gina Venolia, Robert DeLine, Andr...
SIGSOFT
2007
ACM
14 years 8 months ago
Program comprehension as fact finding
Little is known about how developers think about design during code modification tasks or how experienced developers' design knowledge helps them work more effectively. We pe...
Thomas D. LaToza, David Garlan, James D. Herbsleb,...