Sciweavers

2943 search results - page 487 / 589
» Software Implementation of Synchronous Programs
Sort
View
CHI
2006
ACM
14 years 10 months ago
Answering why and why not questions in user interfaces
Modern applications such as Microsoft Word have many automatic features and hidden dependencies that are frequently helpful but can be mysterious to both novice and expert users. ...
Brad A. Myers, David A. Weitzman, Andrew Jensen Ko...
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
14 years 5 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
ISW
2009
Springer
14 years 4 months ago
Towards Security Notions for White-Box Cryptography
Abstract. While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on softwa...
Amitabh Saxena, Brecht Wyseur, Bart Preneel
EICS
2009
ACM
14 years 4 months ago
GT/SD: performance and simplicity in a groupware toolkit
Many tools exist for developing real-time distributed groupware, but most of these tools focus primarily on the performance of the resulting system, or on simplifying the developm...
Brian de Alwis, Carl Gutwin, Saul Greenberg
MM
2009
ACM
217views Multimedia» more  MM 2009»
14 years 4 months ago
Streaming HD H.264 encoder on programmable processors
Programmable processors have great advantage over dedicated ASIC design under intense time-to-market pressure. However, realtime encoding of high-definition (HD) H.264 video (up t...
Nan Wu, Mei Wen, Wei Wu, Ju Ren, Huayou Su, Changq...