Sciweavers

478 search results - page 75 / 96
» Working Effectively with Legacy Code
Sort
View
ISVC
2010
Springer
14 years 7 months ago
Indented Pixel Tree Plots
We introduce Indented Pixel Tree Plots (IPTPs): a novel pixel-based visualization technique for depicting large hierarchies. It is inspired by the visual metaphor of indented outli...
Michael Burch, Michael Raschke, Daniel Weiskopf
CORR
2011
Springer
211views Education» more  CORR 2011»
14 years 1 months ago
Programming Massively Parallel Architectures using MARTE: a Case Study
—Nowadays, several industrial applications are being ported to parallel architectures. These applications take advantage of the potential parallelism provided by multiple core pr...
Antonio Wendell De Oliveira Rodrigues, Fréd...
DIMVA
2011
14 years 1 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
CCS
2010
ACM
14 years 10 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...
INFOCOM
2010
IEEE
14 years 8 months ago
TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client
—BitTorrent (BT) has carried out a significant and continuously increasing portion of Internet traffic. While several designs have been recently proposed and implemented to imp...
Shansi Ren, Enhua Tan, Tian Luo, Songqing Chen, Le...