Sciweavers

1944 search results - page 270 / 389
» Understanding and evaluating creativity
Sort
View
127
Voted
DANCE
2002
IEEE
15 years 8 months ago
Modeling CPU Demand in Heterogeneous Active Networks
Active-network technology envisions deploying execution environments in network elements so that application-specific processing can be applied to network traffic. To provide safe...
Virginie Galtier, Kevin L. Mills, Yannick Carlinet
124
Voted
ICSM
2002
IEEE
15 years 8 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
P2P
2002
IEEE
147views Communications» more  P2P 2002»
15 years 8 months ago
Building a P2P Forum System with JXTA
Decentralized file-sharing systems like Napster [11] and Gnutella [23] have popularized the peer-to-peer approach [18,20,22], which emphasizes the use of distributed resources in ...
Emir Halepovic, Ralph Deters
SCAM
2002
IEEE
15 years 8 months ago
Precise Call Graph Construction in the Presence of Function Pointers
The use of pointers presents serious problems for software productivity tools for software understanding, restructuring, and testing. Pointers enable indirect memory accesses thro...
Ana Milanova, Atanas Rountev, Barbara G. Ryder
HRI
2009
ACM
15 years 8 months ago
Nonverbal leakage in robots: communication of intentions through seemingly unintentional behavior
Human communication involves a number of nonverbal cues that are seemingly unintentional, unconscious, and automatic—both in their production and perception—and convey rich in...
Bilge Mutlu, Fumitaka Yamaoka, Takayuki Kanda, Hir...