Sciweavers

2797 search results - page 443 / 560
» Code query by example
Sort
View
WCRE
2005
IEEE
15 years 8 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
MSR
2005
ACM
15 years 8 months ago
Mining version histories to verify the learning process of Legitimate Peripheral Participants
Since code revisions reflect the extent of human involvement in the software development process, revision histories reveal the interactions and interfaces between developers and...
Shih-Kun Huang, Kang-min Liu
SC
2005
ACM
15 years 8 months ago
Multilevel Parallelism in Computational Chemistry using Common Component Architecture and Global Arrays
The development of complex scientific applications for high-end systems is a challenging task. Addressing complexity of the involved software and algorithms is becoming increasing...
Manojkumar Krishnan, Yuri Alexeev, Theresa L. Wind...
VRST
2005
ACM
15 years 8 months ago
Dynamic creation of interactive mixed reality presentations
In this paper, we describe a method of dynamic creation of interactive presentations for Mixed Reality environments. The presentations are created automatically for collections of...
Krzysztof Walczak, Rafal Wojciechowski
EUROPAR
2005
Springer
15 years 8 months ago
Developing Java Grid Applications with Ibis
Ibis1 is a programming environment for the development of grid applications in Java. We aim to support a wide range of applications and parallel platforms, so our example programs ...
Kees van Reeuwijk, Rob van Nieuwpoort, Henri E. Ba...