Sciweavers

4820 search results - page 423 / 964
» Implementing Signatures for C
Sort
View
MCETECH
2009
Springer
15 years 11 months ago
TwoStep: An Authentication Method Combining Text and Graphical Passwords
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based gr...
Paul C. van Oorschot, Tao Wan
SEMWEB
2009
Springer
15 years 11 months ago
A Conformance Test Suite for the OWL 2 RL/RDF Rules Language and the OWL 2 RDF-Based Semantics
We present the first version of a comprehensive conformance test suite for reasoners implementing the OWL 2 RL/RDF rules language and compliant super languages, up to the scale of...
Michael Schneider, Kai Mainzer
APLAS
2009
ACM
15 years 11 months ago
Fractional Ownerships for Safe Memory Deallocation
We propose a type system for a programming language with memory allocation/deallocation primitives, which prevents memory-related errors such as double-frees and memory leaks. The ...
Kohei Suenaga, Naoki Kobayashi
ITICSE
2009
ACM
15 years 11 months ago
Evaluating student experiences in developing software for humanity
Student involvement in Humanitarian Free and Open Source Software (HFOSS) projects holds the potential to provide a rich education experience to undergraduates. This paper discuss...
Gregory W. Hislop, Heidi J. C. Ellis, Ralph A. Mor...
168
Voted
JTRES
2009
ACM
15 years 11 months ago
Using hardware methods to improve time-predictable performance in real-time Java systems
This paper describes hardware methods, a lightweight and platform-independent scheme for linking real-time Java code to co-processors implemented using a hardware description lang...
Jack Whitham, Neil C. Audsley, Martin Schoeberl