Sciweavers

2613 search results - page 432 / 523
» Active Software Artifacts
Sort
View
CF
2004
ACM
15 years 5 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
GROUP
2003
ACM
15 years 5 months ago
How people use orientation on tables: comprehension, coordination and communication
In order to support co-located collaboration, many researchers are now investigating how to effectively augment tabletops with electronic displays. As far back as 1988, orientatio...
Russell Kruger, M. Sheelagh T. Carpendale, Stacey ...
SIGUCCS
2003
ACM
15 years 5 months ago
Teaching with technology, setting an example
Providing instructional technology support for faculty requires a range of skills, from knowledge of software and hardware, to an ability to communicate, teach workshops, and rela...
Trevor Murphy, Mika Hirai
EUROPAR
2003
Springer
15 years 5 months ago
RECSY - A High Performance Library for Sylvester-Type Matrix Equations
In this presentation, we give an overview of research activities at the Department of Computing Science, Ume˚a University with focus on Scientific, Parallel and High-Performance...
Isak Jonsson, Bo Kågström
ICSE
2003
IEEE-ACM
15 years 5 months ago
Architecture as an Emergent Property of Requirements Integration
Functional requirements contain, and systems exhibit, the behavior summarized below.Despite the advances in software engineering since 1968, how to go from a set of functional req...
R. Geoff Dromey