Sciweavers

689 search results - page 44 / 138
» Program transformations for information personalization
Sort
View
CHI
2007
ACM
15 years 6 months ago
Aligning development tools with the way programmers think about code changes
Software developers must modify their programs to keep up with changing requirements and designs. Often, a conceptually simple change can require numerous edits that are similar b...
Marat Boshernitsan, Susan L. Graham, Marti A. Hear...
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
14 years 11 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
122
Voted
ESOP
2005
Springer
15 years 8 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
SIGCSE
2008
ACM
104views Education» more  SIGCSE 2008»
15 years 2 months ago
Inspiring blind high school students to pursue computer science with instant messaging chatbots
Blind students are an underrepresented group in computer science. In this paper, we describe our experience preparing and leading the computer science track at the National Federa...
Jeffrey P. Bigham, Maxwell B. Aller, Jeremy T. Bru...
PLDI
2000
ACM
15 years 6 months ago
Off-line variable substitution for scaling points-to analysis
Most compiler optimizations and software productivity tools rely on information about the effects of pointer dereferences in a program. The purpose of points-to analysis is to com...
Atanas Rountev, Satish Chandra