Sciweavers

5275 search results - page 263 / 1055
» Computing by observing
Sort
View
DSN
2000
IEEE
15 years 8 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
CHI
2000
ACM
15 years 8 months ago
Alice: lessons learned from building a 3D system for novices
We present lessons learned from developing Alice, a 3D graphics programming environment designed for undergraduates with no 3D graphics or programming experience. Alice is a Windo...
Matthew Conway, Steve Audia, Tommy Burnette, Denni...
CHI
1999
ACM
15 years 8 months ago
Implementing Interface Attachments Based on Surface Representations
This paper describes an architecture for supporting interface attuchments- small interactive programs which are designed to augment the functionality of other applications. This a...
Dan R. Olsen, Scott E. Hudson, Thom Verratti, Jere...
ICCAD
1999
IEEE
101views Hardware» more  ICCAD 1999»
15 years 8 months ago
Efficient model reduction of interconnect via approximate system gramians
Krylov-subspace based methods for generating low-order models of complicated interconnect are extremely effective, but there is no optimality theory for the resulting models. Alte...
Jing-Rebecca Li, Jacob White
HASE
1998
IEEE
15 years 8 months ago
Optimal Discrimination between Transient and Permanent Faults
An important practical problem in fault diagnosis is discriminating between permanent faults and transient faults. In many computer systems, the majority of errors are due to tran...
M. Pizza, Lorenzo Strigini, Andrea Bondavalli, Fel...