Sciweavers

682 search results - page 134 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
ICSE
1998
IEEE-ACM
13 years 11 months ago
Non-Intrusive Object Introspection in C++: Architecture and Application
We describe the design and implementation of system architecture to support object introspection in C++. In this system, information is collected by parsing class declarations, an...
Tyng-Ruey Chuang, Y. S. Kuo, Chien-Min Wang
TES
2001
Springer
13 years 12 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
HPCA
2000
IEEE
13 years 12 months ago
A Prefetching Technique for Irregular Accesses to Linked Data Structures
Prefetching offers the potential to improve the performance of linked data structure (LDS) traversals. However, previously proposed prefetching methods only work well when there i...
Magnus Karlsson, Fredrik Dahlgren, Per Stenstr&oum...
SIGCSE
2008
ACM
143views Education» more  SIGCSE 2008»
13 years 7 months ago
Test-driven learning in early programming courses
Coercing new programmers to adopt disciplined development practices such as thorough unit testing is a challenging endeavor. Test-driven development (TDD) has been proposed as a s...
David Janzen, Hossein Saiedian
USS
2010
13 years 5 months ago
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
On November 3, 2009, voters in Takoma Park, Maryland, cast ballots for mayor and city council members using the ScantegrityII voting system--the first time any end-to-end (e2e) vo...
Richard Carback, David Chaum, Jeremy Clark, John C...