Sciweavers

702 search results - page 116 / 141
» Implementing software product lines using traits
Sort
View
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
14 years 1 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
ECRA
2002
180views more  ECRA 2002»
13 years 7 months ago
vCOM: Electronic commerce in a collaborative virtual world
Existing e-commerce applications on the web provide the users a relatively simple, browser-based interface to access available products. Customers are not provided with the same s...
Xiaojun Shen, T. Radakrishnan, Nicolas D. Georgana...
SIGSOFT
2006
ACM
14 years 1 months ago
Memories of bug fixes
The change history of a software project contains a rich collection of code changes that record previous development experience. Changes that fix bugs are especially interesting, ...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
UIST
1999
ACM
14 years 8 days ago
Sketching with Projective 2D Strokes
Freehand sketching has long had appeal as an artistic medium for conceptual design because of its immediacy in capturing and communicating design intent and visual experience. We ...
Osama Tolba, Julie Dorsey, Leonard McMillan
SRDS
1999
IEEE
14 years 7 days ago
An Agent Platform for Reliable Asynchronous Distributed Programming
Production of reliable and flexible distributed applications is a growing area of interest and research. Various middleware technologies are often used as the communication infras...
Luc Bellissard, Noel De Palma, André Freyss...