Sciweavers

6164 search results - page 1099 / 1233
» Teaching Computer Security
Sort
View
OOPSLA
2001
Springer
15 years 8 months ago
Regression Test Selection for Java Software
Regression testing is applied to modified software to provide confidence that the changed parts behave as intended and that the unchanged parts have not been adversely affected ...
Mary Jean Harrold, James A. Jones, Tongyu Li, Dong...
122
Voted
ASPLOS
2000
ACM
15 years 7 months ago
Architectural Support for Fast Symmetric-Key Cryptography
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides ...
Jerome Burke, John McDonald, Todd M. Austin
141
Voted
AGENTS
1999
Springer
15 years 7 months ago
A Personal News Agent That Talks, Learns and Explains
Most work on intelligent information agents has thus far focused on systems that are accessible through the World Wide Web. As demanding schedules prohibit people from continuous ...
Daniel Billsus, Michael J. Pazzani
138
Voted
POPL
1998
ACM
15 years 7 months ago
From System F to Typed Assembly Language
abstractions, such as closures, tuples, and user-defined abstract data types. The type system ensures that well-typed programs cannot violate these abstractions. In addition, the ...
J. Gregory Morrisett, David Walker, Karl Crary, Ne...
113
Voted
AGENTS
1997
Springer
15 years 7 months ago
An Intelligent Assistant for Patient Health Care
The Patient Advocate is designed to be an intelligent assistant for patient-centered health care. Residing on a home computer or special-purpose device and operating within an ext...
Silvia Miksch, Kenneth Cheng, Barbara Hayes-Roth
« Prev « First page 1099 / 1233 Last » Next »