Sciweavers

1769 search results - page 314 / 354
» An implementation of argument based discussion
Sort
View
ICSE
2010
IEEE-ACM
14 years 1 months ago
An analysis of the variability in forty preprocessor-based software product lines
Over 30 years ago, the preprocessor cpp was developed to extend the programming language C by lightweight metaprogramming capabilities. Despite its error-proneness and low ion lev...
Jörg Liebig, Sven Apel, Christian Lengauer, C...
AGENTS
2001
Springer
14 years 1 months ago
Using rat navigation models to learn orientation from visual input on a mobile robot
Rodents possess extraordinary navigation abilities that are far in excess of what current state-of-the-art robot agents are capable of. This paper describes research that is part ...
Brett Browning
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
14 years 16 days ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
SCM
1998
13 years 10 months ago
PRCS: The Project Revision Control System
PRCS is an attempt to provide a version-control system for collections of les with a simple operational model, a clean user interface, and high performance. PRCS is characterized b...
Josh MacDonald, Paul N. Hilfinger, Luigi Semenzato
SACMAT
2011
ACM
12 years 11 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...