Sciweavers

1445 search results - page 237 / 289
» Tool Integration in Software Engineering Environments
Sort
View
UIST
2010
ACM
13 years 6 months ago
Soylent: a word processor with a crowd inside
This paper introduces architectural and interaction patterns for integrating crowdsourced human contributions directly into user interfaces. We focus on writing and editing, compl...
Michael S. Bernstein, Greg Little, Robert C. Mille...
FSTTCS
2003
Springer
14 years 2 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
ACMSE
2008
ACM
13 years 10 months ago
Education and design: using human-computer interaction case studies to learn
As computers become increasingly integral to daily life there is a need for computer scientists to focus on the user. This, in part, entails developing applications that have inte...
Gregory Smith, Laurian C. Vega, D. Scott McCrickar...
ACSC
2006
IEEE
14 years 2 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
EUROSYS
2010
ACM
14 years 3 months ago
XCPU3: Workload Distribution and Aggregation
The mainstream adoption of cluster, grid, and most recently cloud computing models have broadened the applicability of parallel programming from scientific communities to the bus...
Pravin Shinde, Eric Van Hensbergen