Sciweavers

1770 search results - page 240 / 354
» Writing requirements in computer security
Sort
View
ASPLOS
1987
ACM
14 years 1 months ago
Machine-Independent Virtual Memory Management for Paged Uniprocessor and Multiprocessor Architectures
This paper describes the design and implementation of virtual memory management within the CMU Mach Operating System and the experiences gained by the Mach kernel group in porting...
Richard F. Rashid, Avadis Tevanian, Michael Young,...
PERVASIVE
2010
Springer
14 years 8 days ago
Specification and Verification of Complex Location Events with Panoramic
We present the design and evaluation of Panoramic, a tool that enables end-users to specify and verify an important family of complex location events. Our approach aims to reduce o...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
ASE
2004
137views more  ASE 2004»
13 years 10 months ago
Automatically Restructuring Programs for the Web
The construction of interactive server-side Web applications differs substantially from the construction of traditional interactive programs. In contrast, existing Web programming...
Jacob Matthews, Robert Bruce Findler, Paul T. Grau...
SOFTWARE
1998
13 years 10 months ago
Interrupts: Just a Minute Never Is
development is a highly abstract process that requires intense concentration. The authors show that interrupting this process can significantly reduce a developer’s efficiency an...
Rini van Solingen, Egon Berghout, Frank van Latum
JOCN
2010
123views more  JOCN 2010»
13 years 8 months ago
Coercion and Compositionality
■ Research in psycholinguistics and in the cognitive neuroscience of language has suggested that semantic and syntactic integration are associated with different neurophysiologi...
Giosuè Baggio, Travis Choma, Michiel van La...