Sciweavers

497 search results - page 46 / 100
» Overview of QAST 2008
Sort
View
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
13 years 10 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll
CHI
2008
ACM
13 years 10 months ago
User experience at google: focus on the user and all else will follow
This paper presents an overview of the User Experience (UX) team at Google. We focus on four aspects of working within Google's product development organization: (1) a bottom...
Irene Au, Richard Boardman, Robin Jeffries, Patric...
SIGMOD
2008
ACM
145views Database» more  SIGMOD 2008»
13 years 7 months ago
Provenance and scientific workflows: challenges and opportunities
Provenance in the context of workflows, both for the data they derive and for their specification, is an essential component to allow for result reproducibility, sharing, and know...
Susan B. Davidson, Juliana Freire
DATESO
2008
129views Database» more  DATESO 2008»
13 years 9 months ago
Database Engineering from the Category Theory Viewpoint
Abstract. This paper gives an overview of XML formal models, summarizes database engineering practices, problems and their evolution. We focus on categorical aspects of XML formal ...
David Toth
ICWSM
2008
13 years 9 months ago
ASL-STEM Forum: A Bottom-Up Approach to Enabling American Sign Language to Grow in STEM Fields
Deaf and hard of hearing students studying advanced topics in Science, Technology, Engineering, and Mathematics (STEM) lack standard terminology to enable them to learn, discuss a...
Jeffrey P. Bigham, Daniel S. Otero, Jessica N. DeW...