Sciweavers

577 search results - page 107 / 116
» An enterprise assurance framework
Sort
View
JUCS
2008
130views more  JUCS 2008»
13 years 9 months ago
Experimenting the Automated Selection of COTS Components Based on Cost and System Requirements
: In a component-based development process the selection of components is an activity that takes place over multiple lifecycle phases that span from requirement specifications thro...
Vittorio Cortellessa, Ivica Crnkovic, Fabrizio Mar...
PE
2008
Springer
173views Optimization» more  PE 2008»
13 years 9 months ago
Improving fairness in a WRED-based DiffServ network: A fluid-flow approach
The DiffServ architecture has been proposed as a scalable approach for upgrading the Internet, adding service differentiation functionalities. However, several aspects of this arc...
Mario Barbera, Alfio Lombardo, Giovanni Schembra, ...
JAR
2000
145views more  JAR 2000»
13 years 9 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
TVCG
2010
129views more  TVCG 2010»
13 years 8 months ago
Projector Placement Planning for High Quality Visualizations on Real-World Colored Objects
—Many visualization applications benefit from displaying content on real-world objects rather than on a traditional display (e.g., a monitor). This type of visualization display ...
Alvin J. Law, Daniel G. Aliaga, Aditi Majumder
MEDES
2010
ACM
13 years 4 months ago
Brazilian public software: beyond sharing
This work presents a case of an innovative Brazilian experience of use of free software in public administration as an emergent ecosystem, and the attempt to establish a quality f...
A. M. Alves, Marcelo Schneck de Paula Pessôa