Sciweavers

146 search results - page 17 / 30
» The Social Dynamics of Pair Programming
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 3 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
CSCW
1998
ACM
14 years 26 days ago
Sustaining Mentoring Relationships On-Line
we have documented shares some of the influences discussed by Ackerman et. al., but has unique dynamics of its own which present unique technical and social demands. Using several ...
D. Kevin O'Neill, Louis M. Gomez
VLSID
2004
IEEE
146views VLSI» more  VLSID 2004»
14 years 9 months ago
CMOS Circuit Design for Minimum Dynamic Power and Highest Speed
{A new low-power design method produces CMOS circuits that consume the least dynamic power at the highest speed permitted under the technology constraint. A gate is characterized b...
Tezaswi Raja, Vishwani D. Agrawal, Michael L. Bush...
POPL
2011
ACM
12 years 11 months ago
Safe nondeterminism in a deterministic-by-default parallel language
A number of deterministic parallel programming models with strong safety guarantees are emerging, but similar support for nondeterministic algorithms, such as branch and bound sea...
Robert L. Bocchino Jr., Stephen Heumann, Nima Hona...
PERCOM
2007
ACM
14 years 8 months ago
Buddy tracking - efficient proximity detection among mobile friends
: Global positioning systems (GPS) and mobile phone networks are making it possible to track individual users with an increasing accuracy. It is natural to ask whether one can use ...
Arnon Amir, Alon Efrat, Jussi Myllymaki, Lingeshwa...