Sciweavers

167 search results - page 27 / 34
» A practical high volume software product line
Sort
View
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
14 years 1 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
ICDAR
2009
IEEE
13 years 5 months ago
Analysis of Book Documents' Table of Content Based on Clustering
Table of contents (TOC) recognition has attracted a great deal of attention in recent years. After reviewing the merits and drawbacks of the existing TOC recognition methods, we h...
Liangcai Gao, Zhi Tang, Xiaofan Lin, Xin Tao, Yimi...
AGILEDC
2008
IEEE
14 years 1 months ago
Mature Agile with a Twist of CMMI
Systematic is an agile company working at CMMI level 5, where the default way of working is based on Scrum and story based early testing development. Solid experiences in combinin...
Carsten Ruseng Jakobsen, Kent Aaron Johnson
DATE
2006
IEEE
104views Hardware» more  DATE 2006»
14 years 1 months ago
Integrated placement and skew optimization for rotary clocking
—The clock distribution network is a key component of any synchronous VLSI design. High power dissipation and pressure volume temperature-induced variations in clock skew have st...
Ganesh Venkataraman, Jiang Hu, Frank Liu, Cliff C....
OOPSLA
2010
Springer
13 years 5 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...