Sciweavers

1805 search results - page 273 / 361
» Understanding Code Mobility
Sort
View
CORR
2010
Springer
132views Education» more  CORR 2010»
14 years 8 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
WH
2010
142views Healthcare» more  WH 2010»
14 years 6 months ago
Social sensing: obesity, unhealthy eating and exercise in face-to-face networks
What is the role of face-to-face interactions in the diffusion of health-related behaviors- diet choices, exercise habits, and long-term weight changes? We use co-location and com...
Anmol Madan, Sai T. Moturu, David Lazer, Alex Pent...
SIGSOFT
2008
ACM
16 years 1 days ago
Randomized active atomicity violation detection in concurrent programs
Atomicity is an important specification that enables programmers to understand atomic blocks of code in a multi-threaded program as if they are sequential. This significantly simp...
Chang-Seo Park, Koushik Sen
SIGSOFT
2005
ACM
16 years 1 days ago
Automatic generation of suggestions for program investigation
Before performing a modification task, a developer usually has to investigate the source code of a system to understand how to carry out the task. Discovering the code relevant to...
Martin P. Robillard
ERSHOV
2009
Springer
15 years 5 months ago
Multi-level Virtual Machine Debugging Using the Java Platform Debugger Architecture
Abstract. Debugging virtual machines (VMs) presents unique challenges, especially meta-circular VMs, which are written in the same language they implement. Making sense of runtime ...
Thomas Würthinger, Michael L. Van De Vanter, ...