Sciweavers

2429 search results - page 188 / 486
» Using Aspects to Design a Secure System
Sort
View
OOPSLA
2005
Springer
15 years 8 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
CHI
2009
ACM
15 years 7 months ago
Getting sidetracked: display design and occasioning photo-talk with the photohelix
In this paper we discuss some of our recent research work designing tabletop interfaces for co-located photo sharing. We draw particular attention to a specific feature of an inte...
Otmar Hilliges, David Shelby Kirk
145
Voted
DAC
2010
ACM
15 years 5 months ago
Electronic design automation for social networks
Online social networks are a growing internet phenomenon: they connect millions of individuals through sharing of common interests, political and religious views, careers, etc. So...
Andrew DeOrio, Valeria Bertacco
110
Voted
ICCAD
1995
IEEE
97views Hardware» more  ICCAD 1995»
15 years 6 months ago
Interface co-synthesis techniques for embedded systems
A key aspect of the synthesis of embedded systems is the automatic integration of system components. This entails the derivation of both the hardware and software interfaces that ...
Pai H. Chou, Ross B. Ortega, Gaetano Borriello
132
Voted
ICCS
2007
Springer
15 years 8 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...