Sciweavers

132 search results - page 24 / 27
» Exploring the use of crowdsourcing to support empirical stud...
Sort
View
CCS
2003
ACM
14 years 25 days ago
On the performance, feasibility, and use of forward-secure signatures
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties...
Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew...
EUROSYS
2010
ACM
14 years 21 days ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
IWPC
2005
IEEE
14 years 1 months ago
Adding Control-Flow to a Visual Data-Flow Representation
Previous studies have shown that novices do not tend to extract or use data-flow information during program comprehension. However, for impact analysis and similar tasks, data-...
David Dearman, Anthony Cox, Maryanne Fisher
EMSOFT
2011
Springer
12 years 7 months ago
RT-Xen: towards real-time hypervisor scheduling in xen
As system integration becomes an increasingly important challenge for complex real-time systems, there has been a significant demand for supporting real-time systems in virtualiz...
Sisu Xi, Justin Wilson, Chenyang Lu, Christopher D...
IUI
2000
ACM
13 years 12 months ago
Adaptive medical information delivery combining user, task and situation models
Medical information delivery for users with different levels of expertise will be required for the manned mission to Mars due to limited potential for communication with Earth. Th...
Luis Francisco-Revilla, Frank M. Shipman III