Sciweavers

6171 search results - page 96 / 1235
» The FrameNet Data and Software
Sort
View
OSDI
2006
ACM
14 years 8 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
DATE
2006
IEEE
93views Hardware» more  DATE 2006»
14 years 2 months ago
Software annotations for power optimization on mobile devices
Modern applications for mobile devices, such as multimedia video/audio, often exhibit a common behavior: they process streams of incoming data in a regular, predictable way. The r...
Radu Cornea, Alexandru Nicolau, Nikil D. Dutt
VR
1999
IEEE
164views Virtual Reality» more  VR 1999»
14 years 11 days ago
The Software Architecture of a Real-Time Battlefield Visualization Virtual Environment
This paper describes the software architecture of Dragon, a real-time situational awareness virtual environment for battlefield visualization. Dragon receives data from a number of...
Simon Julier, Rob King, Brad Colbert, Jim Durbin, ...
ISCA
1990
IEEE
186views Hardware» more  ISCA 1990»
14 years 4 days ago
Adaptive Software Cache Management for Distributed Shared Memory Architectures
An adaptive cache coherence mechanism exploits semantic information about the expected or observed access behavior of particular data objects. We contend that, in distributed shar...
John K. Bennett, John B. Carter, Willy Zwaenepoel
CAISE
2006
Springer
13 years 12 months ago
Aligning Software Architectures of Mobile Applications on Business Requirements
The support of mobile workers with mobile IT solutions can create dremendous improvements in mobile business processes of a company. The main charateristic of such a mobile system ...
Volker Gruhn, André Köhler