Sciweavers

933 search results - page 130 / 187
» Secure Software Architectures Design by Aspect Orientation
Sort
View
CASES
2006
ACM
14 years 3 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
SIGECOM
2000
ACM
147views ECommerce» more  SIGECOM 2000»
14 years 1 months ago
MultECommerce: a distributed architecture for collaborative shopping on the WWW
The WWW has made information and services more available than ever before. Many of the first Web applications have been emulations of real world activities, in particular, e-comme...
Stefano Puglia, Robert Carter, Ravi Jain
CCS
2009
ACM
14 years 1 months ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...
GPCE
2007
Springer
14 years 27 days ago
Generative metaprogramming
Recent advances in Software Engineering have reduced the cost of coding programs at the expense of increasing the complexity of program synthesis, i.e. metaprograms, which when ex...
Salvador Trujillo, Maider Azanza, Oscar Día...
CHI
2007
ACM
14 years 9 months ago
Noticing notice: a large-scale experiment on the timing of software license agreements
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report ...
Nathaniel Good, Jens Grossklags, Deirdre K. Mullig...