Sciweavers

5591 search results - page 1021 / 1119
» Design patterns: between programming and software design
Sort
View
ISORC
2009
IEEE
15 years 4 months ago
From Requirements to Code Revisited
In his article entitled "From Play-In Scenarios to Code: An Achievable Dream", David Harel presented a development schema that makes it possible to go from high-level us...
Tewfik Ziadi, Xavier Blanc, Amine Raji
SIGDOC
2009
ACM
15 years 4 months ago
Modeling task experience in user assistance systems
One of the major issues for user assistance systems consists of “providing help at an appropriate level”. In this paper we analyze the problem of modeling task experience — ...
Andrea Kohlhase, Michael Kohlhase
VRST
2009
ACM
15 years 4 months ago
A semantic environment model for crowd simulation in multilayered complex environment
Simulating crowds in complex environment is fascinating and challenging, however, modeling of the environment is always neglected in the past, which is one of the essential proble...
Hao Jiang, Wenbin Xu, Tianlu Mao, Chunpeng Li, Shi...
DATE
2008
IEEE
99views Hardware» more  DATE 2008»
15 years 4 months ago
Thermal Balancing Policy for Streaming Computing on Multiprocessor Architectures
As feature sizes decrease, power dissipation and heat generation density exponentially increase. Thus, temperature gradients in Multiprocessor Systems on Chip (MPSoCs) can serious...
Fabrizio Mulas, Michele Pittau, Marco Buttu, Salva...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 4 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
« Prev « First page 1021 / 1119 Last » Next »