Sciweavers

7429 search results - page 1410 / 1486
» Embedded System Update
Sort
View
ISCA
2007
IEEE
146views Hardware» more  ISCA 2007»
15 years 10 months ago
Hardware atomicity for reliable software speculation
Speculative compiler optimizations are effective in improving both single-thread performance and reducing power consumption, but their implementation introduces significant compl...
Naveen Neelakantam, Ravi Rajwar, Suresh Srinivas, ...
IWPSE
2007
IEEE
15 years 10 months ago
Talking tests: an empirical assessment of the role of fit acceptance tests in clarifying requirements
The starting point for software evolution is usually a change request, expressing the new or updated requirements on the delivered system. The requirements specified in a change ...
Filippo Ricca, Marco Torchiano, Mariano Ceccato, P...
MSS
2007
IEEE
100views Hardware» more  MSS 2007»
15 years 10 months ago
Efficient Logging and Replication Techniques for Comprehensive Data Protection
Mariner is an iSCSI-based storage system that is de­ signed to provide comprehensive data protection on com­ modity ATA disk and Gigabit Ethernet technologies while offering the...
Maohua Lu, Shibiao Lin, Tzi-cker Chiueh
AIED
2007
Springer
15 years 10 months ago
Can Help Seeking Be Tutored? Searching for the Secret Sauce of Metacognitive Tutoring
In our on-going endeavor to teach students better help-seeking skills we designed a three-pronged Help-Seeking Support Environment that includes (a) classroom instruction (b) a Sel...
Ido Roll, Vincent Aleven, Bruce M. McLaren, Kennet...
CCS
2007
ACM
15 years 10 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
« Prev « First page 1410 / 1486 Last » Next »