Sciweavers

3837 search results - page 614 / 768
» Concurrent Engineering support in Software Engineering
Sort
View
CSCW
2008
ACM
13 years 11 months ago
Providing awareness in multi-synchronous collaboration without compromising privacy
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...
Claudia-Lavinia Ignat, Stavroula Papadopoulou, G&e...
ASPLOS
2012
ACM
12 years 5 months ago
Data races vs. data race bugs: telling the difference with portend
Even though most data races are harmless, the harmful ones are at the heart of some of the worst concurrency bugs. Alas, spotting just the harmful data races in programs is like ï...
Baris Kasikci, Cristian Zamfir, George Candea
EUROSYS
2006
ACM
14 years 6 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
GPCE
2007
Springer
14 years 3 months ago
Generative programming techniques for Java library migration
Embedded systems can be viewed as scaled-down versions of their one counterparts. In many cases, the software abstractions and libraries for embedded systems can be derived from l...
Victor L. Winter, Azamatbek Mametjanov
CODES
2003
IEEE
14 years 2 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang