Sciweavers

2236 search results - page 175 / 448
» Secure Software Design in Practice
Sort
View
CHI
2011
ACM
14 years 7 months ago
Antiquarian answers: book restoration as a resource for design
As technologies age, they experience wear and degradation, sometimes resulting in loss of functionality. In response, parts are replaced and software is updated. Yet restorationâ€...
Daniela K. Rosner, Alex S. Taylor
DRM
2003
Springer
15 years 9 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
CHI
2007
ACM
16 years 4 months ago
Design and evaluation of 3d models for electronic dental records
We present the results of a field study of some of the work practices and software used by dentists. We also present the design, implementation, and evaluation of a user interface...
Michael F. Marotta, Purin Phanichphant, Patrick Ma...
157
Voted
OOPSLA
2007
Springer
15 years 10 months ago
Software speculative multithreading for Java
We apply speculative multithreading to sequential Java programs in software to achieve speedup on existing multiprocessors. A common speculation library supports both Java bytecod...
Christopher J. F. Pickett
IV
2009
IEEE
124views Visualization» more  IV 2009»
15 years 10 months ago
Needs Assessment for the Design of Information Synthesis Visual Analytics Tools
Information synthesis is a key portion of the analysis process with visual analytics tools. This stage of work requires users to collect, organize, and add meaning to individual a...
Anthony C. Robinson