Sciweavers

1654 search results - page 297 / 331
» Comparing Two Software Design Process Theories
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
IJVR
2006
124views more  IJVR 2006»
14 years 10 months ago
Improving Virtual Reality Applications in CAD through Semantics
In this article we propose an architecture for the inclusion and exploitation of semantic aspects in a CAD environment. Our schema focuses on the enhancement and improvement of a c...
Carlos Toro, Jorge Posada, Stefan Wundrak, Andr&ea...
OOPSLA
2005
Springer
15 years 3 months ago
Quantifying the performance of garbage collection vs. explicit memory management
Garbage collection yields numerous software engineering benefits, but its quantitative impact on performance remains elusive. One can compare the cost of conservative garbage col...
Matthew Hertz, Emery D. Berger
CASES
2008
ACM
14 years 12 months ago
A light-weight cache-based fault detection and checkpointing scheme for MPSoCs enabling relaxed execution synchronization
While technology advances have made MPSoCs a standard architecture for embedded systems, their applicability is increasingly being challenged by dramatic increases in the amount o...
Chengmo Yang, Alex Orailoglu
SIGCSE
2002
ACM
152views Education» more  SIGCSE 2002»
14 years 9 months ago
Learning styles and performance in the introductory programming sequence
This paper reports on the implication of different preferred learning styles on students'performance in the introductory programming sequence and on work in progress on how t...
Lynda Thomas, Mark Ratcliffe, John Woodbury, Emma ...