Sciweavers

3404 search results - page 276 / 681
» C Programming Tutorial
Sort
View
135
Voted
SC
2004
ACM
15 years 9 months ago
The Potential of Computation Regrouping for Improving Locality
Improving program locality has become increasingly important on modern computer systems. An effective strategy is to group computations on the same data so that once the data are ...
Chen Ding, Maksim Orlovich
126
Voted
CP
2004
Springer
15 years 9 months ago
Leveraging the Learning Power of Examples in Automated Constraint Acquisition
Constraint programming is rapidly becoming the technology of choice for modeling and solving complex combinatorial problems. However, users of constraint programming technology nee...
Christian Bessière, Remi Coletta, Eugene C....
142
Voted
ITNG
2010
IEEE
15 years 8 months ago
ACAT: A Web-Based Software Tool to Facilitate Course Assessment for ABET Accreditation
—There are several institutions that accredit educational programs and require documentation to ensure that an educational program regularly meets certain criteria. This paper fo...
Eugene Essa, Andrew Dittrich, Sergiu M. Dascalu, F...
117
Voted
TRUST
2010
Springer
15 years 8 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
136
Voted
POPL
1999
ACM
15 years 8 months ago
JFlow: Practical Mostly-Static Information Flow Control
A promising technique for protecting privacy and integrity of sensitive data is to statically check information flow within programs that manipulate the data. While previous work...
Andrew C. Myers