Sciweavers

5470 search results - page 1057 / 1094
» Enterprise Information Architecture
Sort
View
CF
2004
ACM
15 years 3 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
CSCW
2004
ACM
15 years 3 months ago
Sometimes you need to see through walls: a field study of application programming interfaces
Information hiding is one of the most important and influential principles in software engineering. It prescribes that software modules hide implementation details from other modu...
Cleidson R. B. de Souza, David F. Redmiles, Li-Te ...
98
Voted
ITICSE
2004
ACM
15 years 3 months ago
SQLator: an online SQL learning workbench
SQL (Structured Query Language) is one of the essential topics in foundation databases courses in higher education. Due to its apparent simple syntax, learning to use the full pow...
Shazia Wasim Sadiq, Maria E. Orlowska, Wasim Sadiq...
IUI
2004
ACM
15 years 3 months ago
Qualitative physics in virtual environments
In this paper, we describe a new approach to the creation of virtual environments, which uses qualitative physics to implement object behaviour. We adopted Qualitative Process The...
Marc Cavazza, Simon Hartley, Jean-Luc Lugrin, Mika...
MOBICOM
2004
ACM
15 years 3 months ago
Exploiting medium access diversity in rate adaptive wireless LANs
Recent years have seen the growing popularity of multi-rate wireless network devices (e.g., 802.11a cards) that can exploit variations in channel conditions and improve overall ne...
Zhengrong Ji, Yi Yang, Junlan Zhou, Mineo Takai, R...
« Prev « First page 1057 / 1094 Last » Next »