Sciweavers

1951 search results - page 115 / 391
» Decoupling Change from Design
Sort
View
SIGSOFT
2003
ACM
16 years 4 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
SOCRATES
2008
133views Education» more  SOCRATES 2008»
15 years 5 months ago
From Daily Language to Scientific Jargon: The Role of Peer Interaction in Web Forum
The paper presents the activities and the results of the "Child Observation in school context workshop", an on line course realized during the last academic years at Mac...
P. Nicolini, T. Lapucci
ICCAD
2002
IEEE
92views Hardware» more  ICCAD 2002»
16 years 28 days ago
ECO algorithms for removing overlaps between power rails and signal wires
Design ECO commonly happens in industry due to constraints or target changes from manufacturing, marketing, reliability, or performance. At each step, designers usually want to mo...
Hua Xiang, Kai-Yuan Chao, D. F. Wong
ACMDIS
2000
ACM
15 years 8 months ago
The Social Life of Engineering Authorizations
We may view documents, not only as “containers” for information, but also as active participants in organizing and sustaining communities. This paper discusses our experiences...
William A. Stubblefield, Karen S. Rogers
ICECCS
2010
IEEE
162views Hardware» more  ICECCS 2010»
15 years 4 months ago
A Tile-Based Approach for Self-Assembling Service Compositions
—This paper presents a novel approach to the design of self-adaptive service-oriented applications based on a new model called service tiles. The approach allows designers to dev...
Luca Cavallaro, Elisabetta Di Nitto, Carlo A. Furi...