Sciweavers

150 search results - page 25 / 30
» Solving the Rectangular assignment problem and applications
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets
We have developed a mechanism which prevents abuse of trusted Java applets, such as digitally signed applets. A signed applet is usually permitted by a user to perform certain fun...
Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuj...
EUC
2006
Springer
13 years 11 months ago
Efficent Algorithm of Energy Minimization for Heterogeneous Wireless Sensor Network
Abstract. Energy and delay are critical issues for wireless sensor networks since most sensors are equipped with non-rechargeable batteries that have limited lifetime. Due to the u...
Mei Kang Qiu, Chun Xue, Zili Shao, Qingfeng Zhuge,...
FECS
2006
100views Education» more  FECS 2006»
13 years 8 months ago
Pair Programming: Not for Everyone?
- Developments in CS1 pedagogy seek to improve the capabilities of students in their understanding of how to write programs. This involves learning how to solve various types of pr...
Jacob P. Somervell
AIEDAM
2007
90views more  AIEDAM 2007»
13 years 7 months ago
Assembly synthesis with subassembly partitioning for optimal in-process dimensional adjustability
Achieving the dimensional integrity for a complex structural assembly is a demanding task due to the manufacturing variations of parts and the tolerance relationship between them....
Byungwoo Lee, Kazuhiro Saitou
ISSTA
2012
ACM
11 years 9 months ago
Static memory leak detection using full-sparse value-flow analysis
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent advances on sparse pointer analysis, Saber is the first to use a full-sparse va...
Yulei Sui, Ding Ye, Jingling Xue