Sciweavers

3330 search results - page 341 / 666
» software 2010
Sort
View
CCS
2010
ACM
15 years 3 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
IJMI
2010
212views more  IJMI 2010»
15 years 2 months ago
Integrating the SE and HCI models in the human factors engineering cycle for re-engineering Computerized Physician Order Entry s
The integration of Software Engineering (SE) and Human-Computer Interaction (HCI) methods and models is an interesting means for modelling an organization's activities, with ...
Stéphanie Bernonville, Christophe Kolski, N...
INFSOF
2010
112views more  INFSOF 2010»
15 years 2 months ago
Experimental program analysis
Program analysis techniques are used by software engineers to deduce and infer characteristics of software systems. Recent research has suggested that certain program analysis tec...
Joseph R. Ruthruff, Sebastian G. Elbaum, Gregg Rot...
MICRO
2010
IEEE
215views Hardware» more  MICRO 2010»
15 years 2 months ago
A Task-Centric Memory Model for Scalable Accelerator Architectures
This paper presents a task-centric memory model for 1000-core compute accelerators. Visual computing applications are emerging as an important class of workloads that can exploit ...
John H. Kelm, Daniel R. Johnson, Steven S. Lumetta...
OOPSLA
2010
Springer
15 years 2 months ago
Teaching and training developer-testing techniques and tool support
Developer testing is a type of testing where developers test their code as they write it, as opposed to testing done by a separate quality assurance organization. Developer testin...
Tao Xie, Jonathan de Halleux, Nikolai Tillmann, Wo...