Sciweavers

3500 search results - page 351 / 700
» Implementing Java on Clusters
Sort
View
108
Voted
ICSE
2007
IEEE-ACM
16 years 1 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
CHI
2010
ACM
15 years 8 months ago
Text 2.0
We created a simple-to-use framework to construct gazeresponsive applications using web technology focussing on text. A plugin enables any compatible browser to interpret a new se...
Ralf Biedert, Georg Buscher, Sven Schwarz, Jö...
95
Voted
ESSOS
2009
Springer
15 years 8 months ago
Report: Measuring the Attack Surfaces of Enterprise Software
Abstract. Software vendors are increasingly concerned about mitigating the security risk of their software. Code quality improvement is a traditional approach to mitigate security ...
Pratyusa K. Manadhata, Yücel Karabulut, Jeann...
104
Voted
FCCM
2009
IEEE
190views VLSI» more  FCCM 2009»
15 years 7 months ago
Optical Flow on the Ambric Massively Parallel Processor Array (MPPA)
The Ambric Massively Parallel Processor Array (MPPA) is a device that contains 336 32-bit RISC processors and is appropriate for embedded systems due to its relatively small physi...
Brad L. Hutchings, Brent E. Nelson, Stephen West, ...
98
Voted
FSEN
2009
Springer
15 years 7 months ago
The Interplay between Relationships, Roles and Objects
In this paper we study the interconnection between relationships and roles. We start from the patterns used to introduce relationships in object oriented languages. We show how th...
Matteo Baldoni, Guido Boella, Leendert van der Tor...