Sciweavers

5843 search results - page 1148 / 1169
» Software Security in Practice
Sort
View
SIGCSE
2010
ACM
219views Education» more  SIGCSE 2010»
14 years 29 days ago
The design of an online environment to support pedagogical code reviews
Inspired by the formal code inspection process commonly used in the software industry, we have been exploring the use of pedagogical code reviews (PCRs), in which a team of three ...
Christopher D. Hundhausen, Anukrati Agrawal, Kyle ...
DATE
2003
IEEE
140views Hardware» more  DATE 2003»
14 years 29 days ago
Qualifying Precision of Abstract SystemC Models Using the SystemC Verification Standard
ng precision of abstract SystemC models using the SystemC Verification Standard Franco Carbognani1 , Christopher K. Lennard2 , C. Norris Ip3 , Allan Cochrane2 , Paul Bates2 1 Caden...
Franco Carbognani, Christopher K. Lennard, C. Norr...
SAINT
2003
IEEE
14 years 28 days ago
Jini Meets UPnP: An Architecture for Jini/UPnP Interoperability
A service discovery framework provides a collection of protocols for developing dynamic client/server applications, allowing clients to find and use services without any previous ...
Jérémie Allard, V. Chinta, S. Gundal...
CASES
2003
ACM
14 years 28 days ago
Exploiting bank locality in multi-bank memories
Bank locality can be defined as localizing the number of load/store accesses to a small set of memory banks at a given time. An optimizing compiler can modify a given input code t...
Guilin Chen, Mahmut T. Kandemir, Hendra Saputra, M...
SENSYS
2003
ACM
14 years 27 days ago
Bluetooth and sensor networks: a reality check
The current generation of sensor nodes rely on commodity components. The choice of the radio is particularly important as it impacts not only energy consumption but also software ...
Martin Leopold, Mads Bondo Dydensborg, Philippe Bo...
« Prev « First page 1148 / 1169 Last » Next »