Sciweavers

797 search results - page 110 / 160
» Finding Reusable Software Components in Large Systems
Sort
View
110
Voted
WWW
2004
ACM
16 years 1 months ago
Shilling recommender systems for fun and profit
Recommender systems have emerged in the past several years as an effective way to help people cope with the problem of information overload. One application in which they have bec...
Shyong K. Lam, John Riedl
POPL
1989
ACM
15 years 4 months ago
How to Make ad-hoc Polymorphism Less ad-hoc
raction that a programming language provides influences the structure and algorithmic complexity of the resulting programs: just imagine creating an artificial intelligence engine ...
Philip Wadler, Stephen Blott
97
Voted
RE
2008
Springer
15 years 21 hour ago
A Case Study in Eliciting Scalability Requirements
Scalability is widely recognized as an important software quality, but it is a quality that historically has lacked a consistent and systematic treatment. To address this problem,...
Leticia Duboc, Emmanuel Letier, David S. Rosenblum...
71
Voted
CAV
2006
Springer
121views Hardware» more  CAV 2006»
15 years 4 months ago
Deriving Small Unsatisfiable Cores with Dominators
Abstract. The problem of finding a small unsatisfiable core of an unsatisfiable CNF formula is addressed. The proposed algorithm, Trimmer, iterates over each internal node d in the...
Roman Gershman, Maya Koifman, Ofer Strichman
102
Voted
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 4 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...