Sciweavers

827 search results - page 122 / 166
» Monitoring Interfaces for Faults
Sort
View
ICSE
2008
IEEE-ACM
16 years 5 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....
CHI
2009
ACM
16 years 4 months ago
Reduced empathizing skills increase challenges for user-centered design
User-Centered Design is surprisingly difficult. One of the biggest issues, certainly for those with no HCI or usability experience, is a lack of appreciation of how users think an...
William Hudson
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
15 years 11 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
FOAL
2009
ACM
15 years 11 months ago
Enhancing base-code protection in aspect-oriented programs
Aspect-oriented programming (AOP) promises to localize concerns that inherently crosscut the primary structural decomposition of a software system. Localization of concerns is cri...
Mohamed ElBendary, John Boyland
ICDCS
2008
IEEE
15 years 10 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...