Sciweavers

3796 search results - page 388 / 760
» Presentations by Programmers for Programmers
Sort
View
FC
2009
Springer
109views Cryptology» more  FC 2009»
15 years 11 months ago
Optimised to Fail: Card Readers for Online Banking
Abstract. The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used toge...
Saar Drimer, Steven J. Murdoch, Ross J. Anderson
129
Voted
ISAAC
2009
Springer
114views Algorithms» more  ISAAC 2009»
15 years 11 months ago
Good Programming in Transactional Memory
Abstract. In a multicore transactional memory (TM) system, concurrent execution threads interact and interfere with each other through shared memory. The less interference a progra...
Raphael Eidenbenz, Roger Wattenhofer
ISEUD
2009
Springer
15 years 11 months ago
What Is End-User Software Engineering and Why Does It Matter?
End-user programming has become ubiquitous, so much so that there are more end-user programmers today than there are professional programmers. End-user programming empowers—but t...
Margaret M. Burnett
122
Voted
OOPSLA
2009
Springer
15 years 11 months ago
Coherent reaction
Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordinat...
Jonathan Edwards
147
Voted
PETRA
2009
ACM
15 years 11 months ago
A mobile rehabilitation application for the remote monitoring of cardiac patients after a heart attack or a coronary bypass surg
This paper describes a personalised rehabilitation application using a smart phone (PDA) and wireless (bio) sensors. It instructs and motivates patients to follow their exercise p...
Valérie Gay, Peter Leijdekkers, Edward Bari...