Sciweavers

286 search results - page 9 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
ICSM
2009
IEEE
14 years 2 months ago
The end-to-end use of source code examples: An exploratory study
This appendix contains the details of our case studies out­ lined in our paper for the 2009 International Conference on Software Maintenance, as well as an expanded discussion se...
Reid Holmes, Rylan Cottrell, Robert J. Walker, J&o...
IJWIS
2007
181views more  IJWIS 2007»
13 years 7 months ago
Answering queries over incomplete data stream histories
Streams of data often originate from many distributed sources. A distributed stream processing system publishes such streams of data and enables queries over the streams. This allo...
Alasdair J. G. Gray, Werner Nutt, M. Howard Willia...
SAC
2011
ACM
12 years 10 months ago
An empirical study on the effectiveness of time-aware test case prioritization techniques
Regression testing is often performed with a time budget and it does not allow executing all test cases. Test case prioritization techniques re-order test cases to increase the ra...
Dongjiang You, Zhenyu Chen, Baowen Xu, Bin Luo, Ch...
EMSOFT
2007
Springer
13 years 11 months ago
Verification of device drivers and intelligent controllers: a case study
The soundness of device drivers generally cannot be verified in isolation, but has to take into account the reactions of the hardware devices. In critical embedded systems, interf...
David Monniaux
ACMSE
2008
ACM
13 years 9 months ago
Education and design: using human-computer interaction case studies to learn
As computers become increasingly integral to daily life there is a need for computer scientists to focus on the user. This, in part, entails developing applications that have inte...
Gregory Smith, Laurian C. Vega, D. Scott McCrickar...