Sciweavers

1963 search results - page 372 / 393
» How is aliasing used in systems software
Sort
View
UIST
2006
ACM
14 years 3 months ago
ModelCraft: capturing freehand annotations and edits on physical 3D models
With the availability of affordable new desktop fabrication techniques such as 3D printing and laser cutting, physical models are used increasingly often during the architectural ...
Hyunyoung Song, François Guimbretièr...
INFOCOM
2002
IEEE
14 years 1 months ago
Avoiding Instability during Graceful Shutdown of OSPF
Abstract—Many recent router architectures decouple the routing engine from the forwarding engine, so that packet forwarding can continue even when the routing process is not acti...
Aman Shaikh, Rohit Dube, Anujan Varma
MOBISYS
2011
ACM
12 years 12 months ago
AppJoy: personalized mobile application discovery
The explosive growth of the mobile application market has made it a significant challenge for the users to find interesting applications in crowded App Stores. To alleviate this...
Bo Yan, Guanling Chen
EUC
2007
Springer
14 years 3 months ago
Palpability Support Demonstrated
Abstract. In ubiquitous computing, as more and more devices are embedded into the environment, there is a risk that the user loses the understanding of the system. In normal use th...
Jeppe Brønsted, Erik Grönvall, David F...
ICSE
2008
IEEE-ACM
14 years 9 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams