Sciweavers

8503 search results - page 1454 / 1701
» Secure Software Architectures
Sort
View
CGO
2011
IEEE
13 years 2 months ago
Practical memory checking with Dr. Memory
—Memory corruption, reading uninitialized memory, using freed memory, and other memory-related errors are among the most difficult programming bugs to identify and fix due to t...
Derek Bruening, Qin Zhao
EUROSYS
2011
ACM
13 years 2 months ago
Increasing performance in byzantine fault-tolerant systems with on-demand replica consistency
Traditional agreement-based Byzantine fault-tolerant (BFT) systems process all requests on all replicas to ensure consistency. In addition to the overhead for BFT protocol and sta...
Tobias Distler, Rüdiger Kapitza
ECSCW
2011
12 years 10 months ago
Flypad: Designing Trajectories in a Large-Scale Permanent Augmented Reality Installation
A long-term naturalistic study reveals how artists designed, visitors experienced, and curators and technicians maintained a public interactive artwork over a four year period. The...
Martin Flintham, Stuart Reeves, Patrick Brundell, ...
PAMI
2012
12 years 1 months ago
CPMC: Automatic Object Segmentation Using Constrained Parametric Min-Cuts
—We present a novel framework to generate and rank plausible hypotheses for the spatial extent of objects in images using bottom-up computational processes and mid-level selectio...
João Carreira, Cristian Sminchisescu
SIGSOFT
2007
ACM
14 years 11 months ago
Mining API patterns as partial orders from source code: from usage scenarios to specifications
A software system interacts with third-party libraries through various APIs. Using these library APIs often needs to follow certain usage patterns. Furthermore, ordering rules (sp...
Mithun Acharya, Tao Xie, Jian Pei, Jun Xu
« Prev « First page 1454 / 1701 Last » Next »