Sciweavers

6953 search results - page 1316 / 1391
» Development Tools for Distributed Applications
Sort
View
SOUPS
2010
ACM
15 years 3 months ago
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit...
ICAIL
2007
ACM
15 years 3 months ago
Opinion mining in legal blogs
We perform a survey into the scope and utility of opinion mining in legal Weblogs (a.k.a. blawgs). The number of `blogs' in the legal domain is growing at a rapid pace and ma...
Jack G. Conrad, Frank Schilder
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
15 years 3 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter
ASM
2008
ASM
15 years 1 months ago
A First Attempt to Express KAOS Refinement Patterns with Event B
anguage (Event B), hence staying at the same abstraction level. Thus we take advantage from the Event B method: (i) it is possible to use the method during the whole development pr...
Abderrahman Matoussi, Frédéric Gerva...
EMSOFT
2008
Springer
15 years 1 months ago
Volatiles are miscompiled, and what to do about it
C's volatile qualifier is intended to provide a reliable link between operations at the source-code level and operations at the memorysystem level. We tested thirteen product...
Eric Eide, John Regehr
« Prev « First page 1316 / 1391 Last » Next »