Sciweavers

5962 search results - page 1036 / 1193
» Working with Patterns and Code
Sort
View
136
Voted
HASKELL
2006
ACM
15 years 9 months ago
Strongly typed memory areas programming systems-level data structures in a functional language
Modern functional languages offer several attractive features to support development of reliable and secure software. However, in our efforts to use Haskell for systems programmin...
Iavor S. Diatchki, Mark P. Jones
122
Voted
ISSTA
2006
ACM
15 years 9 months ago
Application of automated environment generation to commercial software
Model checking can be an effective technique for detecting concurrency-related errors in software systems. However, due to scalability issues, to handle industrial-strength softw...
Oksana Tkachuk, Sreeranga P. Rajan
137
Voted
WS
2006
ACM
15 years 9 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
130
Voted
RTAS
2005
IEEE
15 years 9 months ago
Timing Analysis for Sensor Network Nodes of the Atmega Processor Family
Low-end embedded architectures, such as sensor nodes, have become popular in diverse fields, many of which impose real-time constraints. Currently, the Atmel Atmega processor fam...
Sibin Mohan, Frank Mueller, David B. Whalley, Chri...
134
Voted
SIGCSE
2005
ACM
146views Education» more  SIGCSE 2005»
15 years 9 months ago
Using image processing projects to teach CS1 topics
As Computer Science educators, we know that students learn more from projects that are fun and challenging, that seem “real” to them, and that allow them to be creative in des...
Richard Wicentowski, Tia Newhall
« Prev « First page 1036 / 1193 Last » Next »