Sciweavers

827 search results - page 122 / 166
» Monitoring Interfaces for Faults
Sort
View
ICSE
2008
IEEE-ACM
16 years 19 days ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....
CHI
2009
ACM
16 years 12 days ago
Reduced empathizing skills increase challenges for user-centered design
User-Centered Design is surprisingly difficult. One of the biggest issues, certainly for those with no HCI or usability experience, is a lack of appreciation of how users think an...
William Hudson
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
15 years 6 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
FOAL
2009
ACM
15 years 6 months ago
Enhancing base-code protection in aspect-oriented programs
Aspect-oriented programming (AOP) promises to localize concerns that inherently crosscut the primary structural decomposition of a software system. Localization of concerns is cri...
Mohamed ElBendary, John Boyland
ICDCS
2008
IEEE
15 years 6 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...