Sciweavers

989 search results - page 130 / 198
» HowNet and Its Computation of Meaning
Sort
View
SP
2003
IEEE
15 years 5 months ago
Using Memory Errors to Attack a Virtual Machine
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Sudhakar Govindavajhala, Andrew W. Appel
ERSHOV
2003
Springer
15 years 5 months ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov
ACMDIS
2000
ACM
15 years 4 months ago
Creativity, Cooperation and Interactive Design
This paper focuses on ways and means of stimulating idea generation in collaborative situations involving designers, engineers, software developers, users and usability people. Pa...
Susanne Bødker, Christina Nielsen, Marianne...
IWCMC
2010
ACM
15 years 4 months ago
Performance of CSI-based multi-user MIMO for the LTE downlink
We consider the application of a channel state information (CSI) based multi-user (MU) multiple input multiple output (MIMO) scheme to the downlink of 3GPP Long Term Evolution (LT...
Philipp Frank, Andreas Müller, Joachim Speide...
VL
1995
IEEE
113views Visual Languages» more  VL 1995»
15 years 3 months ago
Toward Empirically-Based Software Visualization Languages
Underlying any single-user software visualization (SV) system is a visualization language onto which its users must map the computations they would like to visualize with the syst...
Sarah A. Douglas, Christopher D. Hundhausen, Donna...