Sciweavers

4923 search results - page 846 / 985
» Software Risk Management
Sort
View
HICSS
2002
IEEE
73views Biometrics» more  HICSS 2002»
14 years 2 months ago
Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design
This paper reports on one of the first efforts to apply Value-Sensitive Design (VSD) to a large-scale real-world software system. We sought to improve informed consent in Web-base...
Batya Friedman, Daniel C. Howe, Edward W. Felten
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
14 years 2 months ago
Design Experience of a Chip Multiprocessor Merlot and Expectation to Functional Verification
We have fabricated a Chip Multiprocessor prototype code-named Merlot to proof our novel speculative multithreading architecture. On Merlot, multiple threads provide wider issue wi...
Satoshi Matsushita
WMTE
2002
IEEE
14 years 2 months ago
Pattern-Based Annotations on E-Books: From Personal to Shared Didactic Content
Our research aims at defining models and software tools in order to provide learners with a training memory. This memory is a computer-based space where a learner can organize and...
Cyrille Desmoulins, Dominique Mille
DAC
2009
ACM
14 years 1 months ago
Heterogeneous code cache: using scratchpad and main memory in dynamic binary translators
Dynamic binary translation (DBT) can be used to address important issues in embedded systems. DBT systems store translated code in a software-managed code cache. Unlike general-pu...
José Baiocchi, Bruce R. Childers
SARA
2009
Springer
14 years 1 months ago
Rewriting Constraint Models with Metamodels
An important challenge in constraint programming is to rewrite constraint models into executable programs calculating the solutions. This phase of constraint processing may requir...
Raphaël Chenouard, Laurent Granvilliers, Rica...