Sciweavers

230 search results - page 20 / 46
» An Empirical Study into Use of Dependency Injection in Java
Sort
View
JCM
2008
94views more  JCM 2008»
13 years 7 months ago
Cell Site Power Characterization for Multi-rate Wireless CDMA Data Networks Using Lognormal Approximation
An analytical model is developed to solve the power-rate assignment problem for multi-rate CDMA systems and calculate the probability density function (PDF) for the downlink traffi...
Ashraf S. Hasan Mahmoud
AINA
2007
IEEE
13 years 7 months ago
On the Integration of Mobility in a Fault-Tolerant e-Health Web Information System
The e-health domain has for objective to assist and manage citizens health. It concerns many actors like patient, doctors, hospitals and administration. Current and forthcoming ge...
Florencia Balbastro, Alfredo Capozucca, Nicolas Gu...
HICSS
2008
IEEE
396views Biometrics» more  HICSS 2008»
14 years 2 months ago
The Use of the UTAUT Model in the Adoption of E-Government Services in Kuwait
E-government initiatives are in their infancy in many developing countries. The success of these initiatives is dependent on government support as well as citizens’ adoption of ...
Suha AlAwadhi, Anne Morris
MSR
2010
ACM
14 years 18 days ago
Identifying licensing of jar archives using a code-search approach
—Free and open source software strongly promotes the reuse of source code. Some open source Java components/libraries are distributed as jar archives only containing the bytecode...
Massimiliano Di Penta, Daniel M. Germán, Gi...
APCSAC
2001
IEEE
13 years 11 months ago
Stacking them up: a Comparison of Virtual Machines
A popular trend in current software technology is to gain program portability by compiling programs to an inte form based on an abstract machine definition. Such approaches date b...
K. John Gough