Sciweavers

10274 search results - page 2017 / 2055
» Lean Software Development
Sort
View
DIMVA
2008
13 years 9 months ago
Data Space Randomization
Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflo...
Sandeep Bhatkar, R. Sekar
ICFP
2010
ACM
13 years 9 months ago
TeachScheme!: a checkpoint
In 1995, my team and I decided to create an outreach project that would use our research on functional programming to change the K-12 computer science curriculum. We had two diffe...
Matthias Felleisen
APLAS
2010
ACM
13 years 8 months ago
JNI Light: An Operational Model for the Core JNI
Abstract. Through foreign function interfaces (FFIs), software components in different programming languages interact with each other in the same address space. Recent years have w...
Gang Tan
CCS
2010
ACM
13 years 8 months ago
Security analysis of India's electronic voting machines
Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, kn...
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Ha...
ICECCS
2010
IEEE
219views Hardware» more  ICECCS 2010»
13 years 8 months ago
Comparison of Six Ways to Extend the Scope of Cheddar to AADL v2 with Osate
Abstract—Cheddar is a framework dedicated to the specification of real-time schedulers, and to their analysis by simulation. It is developed in Ada. Some parts of its modular ar...
Mickaël Kerboeuf, Alain Plantec, Frank Singho...
« Prev « First page 2017 / 2055 Last » Next »