Sciweavers

182 search results - page 12 / 37
» The Secret Art of Computer Programming
Sort
View
JLP
2007
98views more  JLP 2007»
13 years 7 months ago
Tempus fugit: How to plug it
Secret or private information may be leaked to an external attacker through the timing behaviour of the system running the untrusted code. After introducing a formalisation of thi...
Alessandra Di Pierro, Chris Hankin, Igor Siveroni,...
ISI
2007
Springer
14 years 1 months ago
DOTS: Detection of Off-Topic Search via Result Clustering
— Often document dissemination is limited to a “need to know” basis so as to better maintain organizational trade secrets. Retrieving documents that are off-topic to a user...
Nazli Goharian, Alana Platt
GRAPHICSINTERFACE
1996
13 years 8 months ago
Exploring Human Visualization of Computer Algorithms
Many educators have used Algorithm Visualization (AV) to teach students of computer science about how computer algorithms work. Our study sheds light on two important questions: (...
Sarah A. Douglas, Christopher D. Hundhausen, Donna...
FCCM
2006
IEEE
101views VLSI» more  FCCM 2006»
14 years 1 months ago
A Type Architecture for Hybrid Micro-Parallel Computers
Recently, platform FPGAs that integrate sequential processors with a spatial fabric have become prevalent. While these hybrid architectures ease the burden of integrating sequenti...
Benjamin Ylvisaker, Brian Van Essen, Carl Ebeling

Book
410views
15 years 5 months ago
Action Arcade Adventure Set
"Have you ever played a side-scrolling action arcade game on your PC and wondered what it takes to program one? How do the programmers scroll their backgrounds so fast and mak...
Diana Gruber