Sciweavers

707 search results - page 124 / 142
» Some Comments on the Coding of Programs
Sort
View
IRI
2006
IEEE
14 years 3 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
ITICSE
2006
ACM
14 years 3 months ago
Foundational actions: teaching software engineering when time is tight
Often Software Engineering courses approach educating undergraduates in good processes and practices by using a simulated product development environment, following all of the ste...
Jerry Boetje
MMM
2005
Springer
115views Multimedia» more  MMM 2005»
14 years 3 months ago
Interoperability and Multimedia Archives
In distributed computing systems, it is unwise to move data to the point of program code, but instead process data at the point of storage. This concept is even more appropriate t...
Dalen Kambur, Damir Becarevic, Mark Roantree
EGC
2005
Springer
14 years 3 months ago
Transparent Fault Tolerance for Grid Applications
A major challenge facing grid applications is the appropriate handling of failures. In this paper we address the problem of making parallel Java applications based on Remote Method...
Pawel Garbacki, Bartosz Biskupski, Henri E. Bal
AOSD
2004
ACM
14 years 3 months ago
Remote pointcut: a language construct for distributed AOP
This paper presents our extension to AspectJ for distributed computing. Although AspectJ allows Java developers to modularize a crosscutting concern as an aspect, this paper shows...
Muga Nishizawa, Shigeru Chiba, Michiaki Tatsubori