Sciweavers

2704 search results - page 501 / 541
» Constraint Management in Engineering of Complex Information ...
Sort
View
CODES
2006
IEEE
15 years 5 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
IWPSE
2003
IEEE
15 years 5 months ago
Program Slicing Tool for Effective Software Evolution Using Aspect-Oriented Technique
One of the issues in software evolution is debugging. Debugging large and complex software systems evolved requires a lot of effort since it is very difficult to localize and ide...
Takashi Ishio, Shinji Kusumoto, Katsuro Inoue
FASE
2007
Springer
15 years 3 months ago
A Family of Distributed Deadlock Avoidance Protocols and Their Reachable State Spaces
Abstract. We study resource management in distributed systems. Incorrect handling of resources may lead to deadlocks, missed deadlines, priority inversions, and other forms of inco...
César Sánchez, Henny B. Sipma, Zohar...
IUI
2009
ACM
15 years 8 months ago
Detecting and correcting user activity switches: algorithms and interfaces
The TaskTracer system allows knowledge workers to define a set of activities that characterize their desktop work. It then associates with each user-defined activity the set of ...
Jianqiang Shen, Jed Irvine, Xinlong Bao, Michael G...
IUI
2006
ACM
15 years 5 months ago
Linking messages and form requests
Large organizations with sophisticated infrastructures have large form-based systems that manage the interaction between the user community and the infrastructure. In many cases, ...
Anthony Tomasic, John Zimmerman, Isaac Simmons