Sciweavers

3216 search results - page 476 / 644
» Software engineering issues for mobile application developme...
Sort
View
IUI
2010
ACM
15 years 10 months ago
Automatically identifying targets users interact with during real world tasks
Information about the location and size of the targets that users interact with in real world settings can enable new innovations in human performance assessment and software usab...
Amy Hurst, Scott E. Hudson, Jennifer Mankoff
CGO
2010
IEEE
15 years 7 months ago
Efficient compilation of fine-grained SPMD-threaded programs for multicore CPUs
In this paper we describe techniques for compiling finegrained SPMD-threaded programs, expressed in programming models such as OpenCL or CUDA, to multicore execution platforms. Pr...
John A. Stratton, Vinod Grover, Jaydeep Marathe, B...
FASE
2004
Springer
15 years 8 months ago
Modeling Role-Based Access Control Using Parameterized UML Models
Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...
PEPM
2009
ACM
15 years 7 months ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson
ICSE
2003
IEEE-ACM
16 years 3 months ago
Stemming Architectural Erosion by Coupling Architectural Discovery and Recovery
Ideally, a software project commences with requirements gathering and specification, reaches its major milestone with system implementation and delivery, and then continues, possi...
Alexander Egyed, Nenad Medvidovic, Paul Grünb...