Sciweavers

2977 search results - page 490 / 596
» Programming Environments for Novices
Sort
View
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
14 years 3 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
QSHINE
2005
IEEE
14 years 3 months ago
Utility-based Adaptive Resource Allocation in Hybrid Wireless Networks
Service availability in wireless networks is highly dependent on efficient resource allocation and guaranteed Quality of Service (QoS) amid overloads and failures. This paper add...
Calin Curescu, Simin Nadjm-Tehrani, Bing Cao, Tere...
RTAS
2005
IEEE
14 years 3 months ago
A Distributed Real-Time Embedded Application for Surveillance, Detection, and Tracking of Time Critical Targets
As computer systems become increasingly internetworked, there is a growing class of distributed realtime embedded (DRE) applications that have characteristics and present challeng...
Joseph P. Loyall, Richard E. Schantz, David Corman...
TRIDENTCOM
2005
IEEE
14 years 3 months ago
A Geography-Aware Scalable Community Wireless Network Test Bed
Wireless mesh networks have increasingly become an object of interest in recent years as a strong alternative to purely wired infrastructure networks and purely mobile wireless ne...
Bow-Nan Cheng, Shivkumar Kalyanaraman, Max Klein
VL
2005
IEEE
119views Visual Languages» more  VL 2005»
14 years 3 months ago
How Well Do Professional Developers Test with Code Coverage Visualizations? An Empirical Study
Despite years of availability of testing tools, professional software developers still seem to need better support to determine the effectiveness of their tests. Without improveme...
Joseph Lawrance, Steven Clarke, Margaret M. Burnet...