Sciweavers

3107 search results - page 511 / 622
» Error-Correcting Source Code
Sort
View
HIPEAC
2005
Springer
15 years 7 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
ICAPR
2005
Springer
15 years 7 months ago
Applying Software Analysis Technology to Lightweight Semantic Markup of Document Text
Abstract. Software analysis techniques, and in particular software “design recovery”, have been highly successful at both technical and businesslevel semantic markup of large s...
Nadzeya Kiyavitskaya, Nicola Zeni, James R. Cordy,...
NIME
2005
Springer
163views Music» more  NIME 2005»
15 years 7 months ago
ixi software: The Interface as Instrument
This paper describes the audio human computer interface experiments of ixi in the past and outlines the current platform for future research. ixi software [5] was founded by Thor ...
Thor Magnusson
SEKE
2005
Springer
15 years 7 months ago
Knowledge Reuse for Software Reuse
Various intelligent component retrieval techniques have been developed to assist a developer discover or locate components in an efficient manner. These techniques share a common ...
Frank McCarey, Mel Ó Cinnéide, Nicho...
115
Voted
SENSYS
2004
ACM
15 years 7 months ago
MNP: multihop network reprogramming service for sensor networks
Reprogramming of sensor networks is an important and challenging problem as it is often necessary to reprogram the sensors in place. In this paper, we propose a multihop reprogram...
Limin Wang