Sciweavers

5843 search results - page 1112 / 1169
» Software Security in Practice
Sort
View
SIGCSE
2002
ACM
152views Education» more  SIGCSE 2002»
13 years 8 months ago
Learning styles and performance in the introductory programming sequence
This paper reports on the implication of different preferred learning styles on students'performance in the introductory programming sequence and on work in progress on how t...
Lynda Thomas, Mark Ratcliffe, John Woodbury, Emma ...
TSE
1998
115views more  TSE 1998»
13 years 8 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 7 months ago
Viewpoints: A high-performance high-dimensional exploratory data analysis tool
Scientific data sets continue to increase in both size and complexity. In the past, dedicated graphics systems at supercomputing centers were required to visualize large data sets,...
Paul R. Gazis, C. Levit, Michael J. Way
INFSOF
2010
173views more  INFSOF 2010»
13 years 6 months ago
Filtering false alarms of buffer overflow analysis using SMT solvers
Buffer overflow detection using static analysis can provide a powerful tool for software ers to find difficult bugs in C programs. Sound static analysis based on abstract interpre...
Youil Kim, Jooyong Lee, Hwansoo Han, Kwang-Moo Cho...
SIMPRA
2011
13 years 3 months ago
Virtual segment: Store-carry-forward relay-based support for wide-area non-real-time data exchange
—In the Internet of the future, a flexible, dynamic combination of wireless and wired access networks is expected to be a key driver for enlarging the broadband communication se...
Shinya Yamamura, Akira Nagata, Masato Tsuru, Hitom...
« Prev « First page 1112 / 1169 Last » Next »