Sciweavers

5838 search results - page 904 / 1168
» A File System for System Programming in Ubiquitous Computing
Sort
View
TGC
2007
Springer
15 years 10 months ago
Adversaries and Information Leaks (Tutorial)
Secure information flow analysis aims to prevent programs from leaking their H (high) inputs to their L (low) outputs. A major challenge in this area is to relax the standard noni...
Geoffrey Smith
ANCS
2007
ACM
15 years 8 months ago
Ruler: high-speed packet matching and rewriting on NPUs
Programming specialized network processors (NPU) is inherently difficult. Unlike mainstream processors where architectural features such as out-of-order execution and caches hide ...
Tomas Hruby, Kees van Reeuwijk, Herbert Bos
TAPSOFT
1995
Springer
15 years 8 months ago
Comparing Flow-Based Binding-Time Analyses
Abstract. Binding-time analyses based on flow analysis have been presented by Bondorf, Consel, Bondorf and Jørgensen, and Schwartzbach and the present author. The analyses are fo...
Jens Palsberg
ITICSE
2003
ACM
15 years 9 months ago
Teaching undergraduate software design in a liberal arts environment using RoboCup
Most large research universities include a software design or software development course as a required or elective component of an undergraduate computer science major. For vario...
Timothy Huang, Frank Swenton
SIGCSE
2008
ACM
166views Education» more  SIGCSE 2008»
15 years 4 months ago
Defense against the dark arts
Computer science faculty must attract and retain students by offering innovative courses that spark student interest, yet still teach core, computer science concepts. These effort...
Mark W. Bailey, Clark L. Coleman, Jack W. Davidson