Sciweavers

14 search results - page 2 / 3
» Broadening accessibility through special interests: a new ap...
Sort
View
CODES
2005
IEEE
13 years 10 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
ELPUB
2007
ACM
13 years 8 months ago
Openness in Higher Education: Open Source, Open Standards, Open Access
For national advisory services in the UK (UKOLN, CETIS, and OSS Watch), varieties of openness (open source software, open standards, and open access to research publications and d...
Brian Kelly, Scott Wilson, Randy Metcalfe
ESEM
2009
ACM
13 years 8 months ago
Understanding the use of inheritance with visual patterns
The goal of this work is to visualize inheritance in objectoriented programs to help its comprehension. We propose a single, compact view of all class hierarchies at once using a ...
Simon Denier, Houari A. Sahraoui
EMSOFT
2005
Springer
13 years 10 months ago
High performance annotation-aware JVM for Java cards
Early applications of smart cards have focused in the area of personal security. Recently, there has been an increasing demand for networked, multi-application cards. In this new ...
Ana Azevedo, Arun Kejariwal, Alexander V. Veidenba...
GECCO
2009
Springer
193views Optimization» more  GECCO 2009»
13 years 9 months ago
Optimization of dynamic memory managers for embedded systems using grammatical evolution
New portable consumer embedded devices must execute multimedia applications (e.g., 3D games, video players and signal processing software, etc.) that demand extensive memory acces...
José L. Risco-Martín, David Atienza,...