Sciweavers

747 search results - page 80 / 150
» Toward a software development methodology for anonymity appl...
Sort
View
UIST
2006
ACM
14 years 2 months ago
Interacting with dynamically defined information spaces using a handheld projector and a pen
The recent trend towards miniaturization of projection technology indicates that handheld devices will soon have the ability to project information onto any surface, thus enabling...
Xiang Cao, Ravin Balakrishnan
AGILEDC
2008
IEEE
13 years 10 months ago
The Accidental Agilists: One Team's Journey from Waterfall to Agile
This case study outlines one team's shift from the traditional waterfall methodology to an agile approach for web and custom application development. The transformation occur...
Mary Beth Snapp, Diane Dagefoerde
USENIX
2008
13 years 11 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
ATS
2003
IEEE
131views Hardware» more  ATS 2003»
14 years 2 months ago
Software-Based Delay Fault Testing of Processor Cores
Software-based self-testing is a promising approach for the testing of processor cores which are embedded inside a System-on-a-Chip (SoC), as it can apply test vectors in function...
Virendra Singh, Michiko Inoue, Kewal K. Saluja, Hi...
FOIS
2010
13 years 10 months ago
Ontologies for Distributed Command and Control Messaging
This paper presents the development of a set of ontologies for use in messaging systems within military and emergency first responder command and control applications. These ontolo...
Duc N. Nguyen, Joseph B. Kopena, Boon Thau Loo, Wi...