Sciweavers

734 search results - page 94 / 147
» Design and implementation of expressive footwear
Sort
View
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 1 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
AGILEDC
2006
IEEE
14 years 1 months ago
Refactoring with Contracts
Design by contract is a practical methodology for developing code together with its specification. The contract consists of class invariants and method preand postconditions. As ...
Maayan Goldstein, Yishai A. Feldman, Shmuel S. Tys...
SCAM
2005
IEEE
14 years 1 months ago
Measuring the Impact of Friends on the Internal Attributes of Software Systems
Differing views have been expressed on the appropriateness of the friend construct in the design and implementation of object-oriented software in C++. However, little empirical a...
Michael English, Jim Buckley, Tony Cahill, Kristia...
CEFP
2005
Springer
14 years 1 months ago
Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: The Hume Approach
This chapter describes Hume: a functionally-based language for programming with bounded resource usage, including time and space properties. The purpose of the Hume language design...
Kevin Hammond
CBSE
2010
Springer
14 years 15 days ago
A Three-Tier Approach for Composition of Real-Time Embedded Software Stacks
Abstract. Many component models and frameworks have been proabstract and capture concerns from Real-Time and Embedded application domains, based on high-level component-based appro...
Frédéric Loiret, Lionel Seinturier, ...