Sciweavers

237 search results - page 8 / 48
» An experience report on the design and delivery of two new s...
Sort
View
ESSOS
2009
Springer
14 years 2 months ago
Report: Extensibility and Implementation Independence of the .NET Cryptographic API
Abstract. When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of that algorithm, it is important that software using that algorithm or...
Pieter Philippaerts, Cédric Boon, Frank Pie...
GECCO
2007
Springer
178views Optimization» more  GECCO 2007»
14 years 1 months ago
Transgenetic algorithm: a new evolutionary perspective for heuristics design
Transgenetic algorithms are evolutionary computing techniques based on living processes where cooperation is the main evolutionary strategy. Those processes contain the movement o...
Elizabeth Ferreira Gouvea Goldbarg, Marco Cé...
ATAL
2007
Springer
14 years 1 months ago
Building coalitions involving agents and humans: reports from agent-based participatory simulations
Agent-based participatory simulations are laboratory experiments designed like agent-based simulations and where humans access the simulation as software agents. This paper descri...
Paul Guyot, Shinichi Honiden
ICSE
2012
IEEE-ACM
11 years 10 months ago
Debugger Canvas: Industrial experience with the code bubbles paradigm
—At ICSE 2010, the Code Bubbles team from Brown University and the Code Canvas team from Microsoft Research presented similar ideas for new user experiences for an integrated dev...
Robert DeLine, Andrew Bragdon, Kael Rowan, Jens Ja...
TOOLS
1999
IEEE
13 years 12 months ago
Design and Evolution of Software Architecture in Practice
With special focus on software architectural issues, we report from the first two major phases of a software development project. Our experience suggests that explicit focus on so...
Michael Christensen, Christian Heide Damm, Klaus M...