Sciweavers

1760 search results - page 230 / 352
» A System to Mark Programs Automatically
Sort
View
SP
2005
IEEE
183views Security Privacy» more  SP 2005»
15 years 9 months ago
A Generic Attack on Checksumming-Based Software Tamper Resistance
Self-checking software tamper resistance mechanisms employing checksums, including advanced systems as recently proposed by Chang and Atallah (2002) and Horne et al. (2002), have ...
Glenn Wurster, Paul C. van Oorschot, Anil Somayaji
129
Voted
STEP
2005
IEEE
15 years 9 months ago
TETE: A Non-Invasive Unit Testing Framework for Source Transformation
While the use of test-driven development as a debugging, pedagogic, and analytical methodology for objectoriented and procedural systems is well documented, it is a relatively une...
Derek M. Shimozawa, James R. Cordy
ICCBR
2005
Springer
15 years 9 months ago
Opportunities for CBR in Learning by Doing
In this paper we partially describe JV2 M, a metaphorical simulation of the Java Virtual Machine where students can learn Java language compilation and reinforce object-oriented pr...
Pedro Pablo Gómez-Martín, Marco Anto...
LCTRTS
2005
Springer
15 years 9 months ago
A sample-based cache mapping scheme
Applications running on the StrongARM SA-1110 or XScale processor cores can specify cache mapping for each virtual page to achieve better cache utilization. In this work, we descr...
Rong Xu, Zhiyuan Li
118
Voted
ECAI
2004
Springer
15 years 8 months ago
An Argumentative Approach to Assessing Natural Language Usage based on the Web Corpus
Abstract. In spite of the significant evolution of spelling and grammar checkers for word-processing software, the problem of judging the appropriateness of language usage in diff...
Carlos Iván Chesñevar, Ana Gabriela ...