Sciweavers

3456 search results - page 585 / 692
» Byte Code Engineering
Sort
View
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
15 years 11 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
113
Voted
SOSP
2007
ACM
15 years 11 months ago
Improving file system reliability with I/O shepherding
We introduce a new reliability infrastructure for file systems called I/O shepherding. I/O shepherding allows a file system developer to craft nuanced reliability policies to de...
Haryadi S. Gunawi, Vijayan Prabhakaran, Swetha Kri...
127
Voted
SIGCSE
2010
ACM
169views Education» more  SIGCSE 2010»
15 years 9 months ago
Interfaces first (and foremost) with Java
ion is a critical concept that underlies many topics in computing science. For example, in software engineering, the distinction between a component’s behavior and its implement...
Paolo A. G. Sivilotti, Matthew Lang
106
Voted
ICDE
2009
IEEE
119views Database» more  ICDE 2009»
15 years 9 months ago
Deductive Framework for Programming Sensor Networks
—Developing powerful paradigms for programming sensor networks is critical to realize the full potential of sensor networks as collaborative data processing engines. In this arti...
Himanshu Gupta, Xianjin Zhu, Xiang Xu
105
Voted
CSE
2009
IEEE
15 years 9 months ago
A Stigmergy Approach for Open Source Software Developer Community Simulation
—The stigmergy collaboration approach provides a hypothesized explanation about how online groups work together. In this research, we presented a stigmergy approach for building ...
Xiaohui Cui, Justin Beaver, Jim N. Treadwell, Thom...