Sciweavers

1130 search results - page 179 / 226
» Developing Trust In Virtual Software Development Teams
Sort
View
115
Voted
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
15 years 8 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
217
Voted
VEE
2012
ACM
255views Virtualization» more  VEE 2012»
13 years 11 months ago
Adding dynamically-typed language support to a statically-typed language compiler: performance evaluation, analysis, and tradeof
Applications written in dynamically typed scripting languages are increasingly popular for Web software development. Even on the server side, programmers are using dynamically typ...
Kazuaki Ishizaki, Takeshi Ogasawara, José G...
104
Voted
IWPC
2005
IEEE
15 years 9 months ago
Concise and Consistent Naming
Approximately 70% of the source code of a software system consists of identifiers. Hence, the names chosen as identifiers are of paramount importance for the readability of comp...
Florian Deißenböck, Markus Pizka
SIGCSE
2004
ACM
101views Education» more  SIGCSE 2004»
15 years 9 months ago
Components-first approaches to CS1/CS2: principles and practice
Ê Among the many ways to focus CS1/CS2 content, two have been published that emphasize concepts of component-based software engineering. Courses based on these two instances of a ...
Emily Howe, Matthew Thornton, Bruce W. Weide
120
Voted
CHI
2005
ACM
16 years 3 months ago
Participatory design of an orientation aid for amnesics
We present the participatory design and evaluation of an orientation aid for individuals who have anterograde amnesia. Our design team included six amnesics who have extreme diffi...
Mike Wu, Ronald Baecker, Brian Richards