Sciweavers

8109 search results - page 1470 / 1622
» A Model of Component-Based Programming
Sort
View
LISA
2007
15 years 5 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
222
Voted
ACMSE
2008
ACM
15 years 5 months ago
Biometrics education with hands-on labs
Biometrics is an emerging field via the automated use of unique and measurable physiological or behavioral characteristics to determine or verify identity. Biometrics has a variet...
Li Yang, Kathy Winters, Joseph M. Kizza
APPROX
2008
Springer
127views Algorithms» more  APPROX 2008»
15 years 5 months ago
Approximating Single Machine Scheduling with Scenarios
In the field of robust optimization, the goal is to provide solutions to combinatorial problems that hedge against variations of the numerical parameters. This constitutes an effor...
Monaldo Mastrolilli, Nikolaus Mutsanas, Ola Svenss...
ATAL
2008
Springer
15 years 5 months ago
Belief operations for motivated BDI agents
The beliefs of an agent reflecting her subjective view of the world constitute one of the main components of a BDI agent. In order to incorporate new information coming from other...
Patrick Krümpelmann, Matthias Thimm, Manuela ...
C3S2E
2008
ACM
15 years 5 months ago
Context-sensitive cut, copy, and paste
Creating and editing source code are tedious and error-prone processes. One important source of errors in editing programs is the failure to correctly adapt a block of copied code...
Reid Kerr, Wolfgang Stürzlinger
« Prev « First page 1470 / 1622 Last » Next »