Sciweavers

415 search results - page 64 / 83
» Evaluating software refactoring tool support
Sort
View
CCS
2007
ACM
14 years 1 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
UIST
2003
ACM
14 years 27 days ago
GADGET: a toolkit for optimization-based approaches to interface and display generation
Recent work is beginning to reveal the potential of numerical optimization as an approach to generating interfaces and displays. Optimization-based approaches can often allow a mi...
James Fogarty, Scott E. Hudson
RSP
2006
IEEE
102views Control Systems» more  RSP 2006»
14 years 1 months ago
Rapid Resource-Constrained Hardware Performance Estimation
In a hardware-software co-design environment, an application is partitioned into modules. Each module is then mapped either to software or to hardware. The mapping process is driv...
Basant Kumar Dwivedi, Arun Kejariwal, M. Balakrish...
ACMDIS
2006
ACM
14 years 1 months ago
Exploring design as a research activity
Human-computer interaction research often includes a significant design component. In cases where software or other tools are developed and described, but no empirical evaluation ...
Blaine Hoffman, Helena M. Mentis, Matthew R. Peter...
CAEPIA
2003
Springer
14 years 27 days ago
Social Analysis of Multi-agent Systems with Activity Theory
The development of software systems is a complex task that requires support techniques to guide the process and solve inconsistencies in its . In the agent paradigm, the use of soc...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...