Sciweavers

8636 search results - page 1501 / 1728
» How Developers Copy
Sort
View
117
Voted
SIGUCCS
2003
ACM
15 years 9 months ago
Escaping the quicksand and getting back on the trail of team projects
Working in a team environment can be either an efficient and productive means of completing projects or a nightmare where the project never seems to end. Most of us have been a pa...
Steven K. Brawn, Kelly Caye, R. Mark Koan
196
Voted
EGOV
2003
Springer
15 years 9 months ago
Implementing e-Government in Spain
: New information and communication technologies within the Administration give rise to a series of important challenges: to select and use the various telematic and computer-relat...
José Luis Bermejo Latre
132
Voted
EUROSYS
2010
ACM
15 years 8 months ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
145
Voted
ISCA
2002
IEEE
91views Hardware» more  ISCA 2002»
15 years 8 months ago
Slack: Maximizing Performance Under Technological Constraints
Many emerging processor microarchitectures seek to manage technological constraints (e.g., wire delay, power, and circuit complexity) by resorting to nonuniform designs that provi...
Brian A. Fields, Rastislav Bodík, Mark D. H...
151
Voted
SACMAT
2010
ACM
15 years 8 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
« Prev « First page 1501 / 1728 Last » Next »