Sciweavers

8623 search results - page 1494 / 1725
» Software engineering for secure systems
Sort
View
PLDI
2003
ACM
15 years 10 months ago
Checking and inferring local non-aliasing
In prior work [15] we studied a language construct restrict that allows programmers to specify that certain pointers are not aliased to other pointers used within a lexical scope....
Alexander Aiken, Jeffrey S. Foster, John Kodumal, ...
150
Voted
SI3D
1995
ACM
15 years 8 months ago
Real-Time Programmable Shading
One of the main techniques used by software renderers to produce stunningly realistic images is programmable shading—executing an arbitrarily complex program to compute the colo...
Anselmo Lastra, Steven Molnar, Marc Olano, Yulan W...
EDBTW
2010
Springer
15 years 8 months ago
The benefits of the interaction between data warehouses and question answering
Business Intelligence (BI) applications allow their users to query, understand, and analyze existing data within their organizations in order to acquire useful knowledge, thus mak...
Antonio Ferrández, Jesús Peral
CSEE
2008
Springer
15 years 6 months ago
An Evaluation of a Mobile Game Concept for Lectures
This paper describes an evaluation of a new game concept, Lecture Quiz, which can be used in lectures in higher education to promote strong student participation and variation in ...
Alf Inge Wang, Terje Øfsdahl, Ole Kristian ...
ISSRE
2010
IEEE
15 years 3 months ago
Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian
Abstract—As smart phones grow in popularity, manufacturers are in a race to pack an increasingly rich set of features into these tiny devices. This brings additional complexity i...
Amiya Kumar Maji, Kangli Hao, Salmin Sultana, Saur...
« Prev « First page 1494 / 1725 Last » Next »