Sciweavers

1777 search results - page 225 / 356
» Programming Cryptographic Protocols
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
Holographic and 3D Teleconferencing and Visualization: Implications for Terabit Networked Applications
— We discuss the evolution of teleconferencing and networked visualization applications to support 3-dimensional display technologies. The implications of a continuation of Moore...
Ladan Gharai, Colin Perkins
IEEEICCI
2005
IEEE
14 years 2 months ago
An empirical study of programmer learning during incremental software development
The paper presents a case study that investigates programmer learning during incremental program development. Dialog based protocol and protocol analysis are used to explore the l...
Shaochun Xu, Václav Rajlich, Andrian Marcus
ASE
2004
137views more  ASE 2004»
13 years 8 months ago
Automatically Restructuring Programs for the Web
The construction of interactive server-side Web applications differs substantially from the construction of traditional interactive programs. In contrast, existing Web programming...
Jacob Matthews, Robert Bruce Findler, Paul T. Grau...
APLAS
2000
ACM
14 years 1 months ago
Kima - An Automated Error Correction System for Concurrent Logic Programs
We have implemented Kima, an automated error correction system for concurrent logic programs. Kima corrects near-misses such as wrong variable occurrences in the absence of explici...
Yasuhiro Ajiro, Kazunori Ueda
ICSE
2003
IEEE-ACM
14 years 2 months ago
A Tutorial on Feature Oriented Programming and Product-Lines
ct Feature Oriented Programming (FOP) is a design methodology and tools for program synthesis. The goal is to specify a target program in terms of the features that it offers, and ...
Don S. Batory