Sciweavers

1411 search results - page 219 / 283
» Interactive Coding for Interactive Proofs
Sort
View
DSN
2007
IEEE
15 years 4 months ago
Robustness Testing of the Windows DDK
Modern computers interact with many kinds of external devices, which have lead to a state where device drivers (DD) account for a substantial part of the operating system (OS) cod...
Manuel Mendonça, Nuno Neves
HICSS
2007
IEEE
212views Biometrics» more  HICSS 2007»
15 years 4 months ago
Fully-automatic generation of user interfaces for multiple devices from a high-level model based on communicative acts
The problems involved in the development of user interfaces become even more severe through the ubiquitous use of a variety of devices such as PCs, mobile phones and PDAs. Each of...
Jürgen Falb, Roman Popp, Thomas Röck, He...
ICSM
2007
IEEE
15 years 4 months ago
On the prediction of the evolution of libre software projects
Libre (free / open source) software development is a complex phenomenon. Many actors (core developers, casual contributors, bug reporters, patch submitters, users, etc.), in many ...
Israel Herraiz, Jesús M. González-Ba...
IPPS
2007
IEEE
15 years 4 months ago
Green Supercomputing in a Desktop Box
The advent of the Beowulf cluster in 1994 provided dedicated compute cycles, i.e., supercomputing for the masses, as a cost-effective alternative to large supercomputers, i.e., su...
Wu-chun Feng, Avery Ching, Chung-Hsing Hsu
KBSE
2007
IEEE
15 years 4 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr