Sciweavers

Share
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
6 years 9 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
EGPGV
2011
Springer
330views Visualization» more  EGPGV 2011»
7 years 10 months ago
Real-Time Ray Tracer for Visualizing Massive Models on a Cluster
We present a state of the art read-only distributed shared memory (DSM) ray tracer capable of fully utilizing modern cluster hardware to render massive out-of-core polygonal model...
Thiago Ize, Carson Brownlee, Charles D. Hansen
RE
2010
Springer
8 years 1 months ago
Integrating Preferences into Goal Models for Requirements Engineering
Requirements can differ in their importance. As such the priorities that stakeholders associate with requirements may vary from stakeholder to stakeholder and from one situation to...
Sotirios Liaskos, Sheila A. McIlraith, Shirin Sohr...
ETS
2000
IEEE
126views Hardware» more  ETS 2000»
8 years 6 months ago
Different (Key)strokes for Different Folks: Designing online venues for professional communities
Educational on-line resources are expanding in their application beyond delivering courses to providing venues in which members of professional communities of practice meet to exc...
Liwana S. Bringelson, Tom Carey
CCR
2002
81views more  CCR 2002»
8 years 6 months ago
Rationalizing key design decisions in the ATM user plane
Any technology requires some number of key design decisions. In the case of the ATM user plane, the choices to use fixed length, 53 byte cells and virtual connections were unortho...
Daniel B. Grossman
JSS
2006
77views more  JSS 2006»
8 years 6 months ago
Recovering architectural assumptions
During the creation of a software architecture, the architects and stakeholders take a lot of decisions. Many of these decisions can be directly related to functional or quality r...
Ronny Roeller, Patricia Lago, Hans van Vliet
JSS
2008
96views more  JSS 2008»
8 years 6 months ago
Documenting after the fact: Recovering architectural design decisions
Software architecture documentation helps people in understanding the software architecture of a system. In practice, software architectures are often documented after the fact, i...
Anton Jansen, Jan Bosch, Paris Avgeriou
FGCS
2006
98views more  FGCS 2006»
8 years 6 months ago
Highly interactive distributed visualization
We report on our iGrid2005 demonstration, called the "Dead Cat Demo"; an example of a highly interactive augmented reality application consisting of software services di...
Michael Scarpa, Robert G. Belleman, Peter M. A. Sl...
CORR
2010
Springer
108views Education» more  CORR 2010»
8 years 6 months ago
Constraint solvers: An empirical evaluation of design decisions
This paper presents an evaluation of the design decisions made in four state-of-the-art constraint solvers; Choco, ECLiPSe, Gecode, and Minion. To assess the impact of design deci...
Lars Kotthoff
ECSA
2010
Springer
8 years 6 months ago
Linking Design Decisions to Design Models in Model-Based Software Development
Abstract. Numerous design decisions are made in model-based software development which often are not documented explicitly. Hence, the design knowledge is 'in the designers mi...
Patrick Könemann, Olaf Zimmermann
books