Sciweavers

1080 search results - page 39 / 216
» Improving Software Inspections by Using Reading Techniques
Sort
View
81
Voted
ISPAN
2009
IEEE
15 years 4 months ago
Temperature Control Framework Using Wireless Sensor Networks and Geostatistical Analysis for Total Spatial Awareness
— This paper presents a novel framework for intelligent temperature control in smart homes using Wireless Sensor Networks (WSN) and geostatistical analysis for total spatial awar...
Charles C. Castello, Jeffrey Fan, Asad Davari, Rue...
COMSWARE
2006
IEEE
15 years 3 months ago
Case study on the use of SDL for specifying an IETF micro mobility protocol
—Recent protocols are become increasingly complex, and lead to further level of complexity when used in combination, often resulting in ambiguous behavior. This paper, starting f...
Telemaco Melia, Amardeo Sarma, Rui L. Aguiar, Diet...
EUROSYS
2006
ACM
15 years 6 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
MICRO
2000
IEEE
122views Hardware» more  MICRO 2000»
15 years 2 months ago
Dynamic zero compression for cache energy reduction
Dynamic Zero Compression reduces the energy required for cache accesses by only writing and reading a single bit for every zero-valued byte. This energy-conscious compression is i...
Luis Villa, Michael Zhang, Krste Asanovic
IWPC
2006
IEEE
15 years 3 months ago
Improving Comprehensibility of Source Code via Traceability Information: a Controlled Experiment
The presence of traceability links between software artefacts is very important to achieve high comprehensibility and maintainability. This is confirmed by several researches and ...
Andrea De Lucia, Rocco Oliveto, Francesco Zurolo, ...