Sciweavers

4923 search results - page 808 / 985
» Software Risk Management
Sort
View
COMPUTER
2007
93views more  COMPUTER 2007»
13 years 9 months ago
The Computing Profession and Higher Education
not things, but abstractions that represent things. Data use provides human civilization’s foundation, and computers and other digital technologies have merely amplified this us...
W. Neville Holmes
EDBTW
2010
Springer
13 years 7 months ago
Using web-based personalization on spatial data warehouses
Spatial data warehouses (SDW) rely on extended multidimensional (MD) models in order to provide decision makers with appropriate structures to intuitively analyse spatial data. Se...
Octavio Glorio, Jose-Norberto Mazón, Irene ...
ACSAC
2010
IEEE
13 years 7 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
ASPLOS
2012
ACM
12 years 5 months ago
Providing safe, user space access to fast, solid state disks
Emerging fast, non-volatile memories (e.g., phase change memories, spin-torque MRAMs, and the memristor) reduce storage access latencies by an order of magnitude compared to state...
Adrian M. Caulfield, Todor I. Mollov, Louis Alex E...
ISSTA
2012
ACM
11 years 11 months ago
Static memory leak detection using full-sparse value-flow analysis
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent advances on sparse pointer analysis, Saber is the first to use a full-sparse va...
Yulei Sui, Ding Ye, Jingling Xue