Sciweavers

316 search results - page 46 / 64
» Case Study: Extreme Programming in a University Environment
Sort
View
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
14 years 3 months ago
Learning with Weblogs: An Empirical Investigation
The study investigates the impact of weblog use on individual learning in a university environment. Weblogs are a relatively new knowledge sharing technology, which enables people...
Helen S. Du, Christian Wagner
PODS
2006
ACM
138views Database» more  PODS 2006»
14 years 10 months ago
Efficiently ordering subgoals with access constraints
d Abstract] Guizhen Yang Artificial Intelligence Center SRI International Menlo Park, CA 94025, USA Michael Kifer Dept. of Computer Science Stony Brook University Stony Brook, NY 1...
Guizhen Yang, Michael Kifer, Vinay K. Chaudhri
ICSM
2002
IEEE
14 years 2 months ago
A Technique for Dynamic Updating of Java Software
During maintenance, systems are updated to correct faults, improve functionality, and adapt the software to changes in its execution environment. The typical softwareupdate proces...
Alessandro Orso, Anup Rao, Mary Jean Harrold
HPCA
2009
IEEE
14 years 10 months ago
Prediction router: Yet another low latency on-chip router architecture
Network-on-Chips (NoCs) are quite latency sensitive, since their communication latency strongly affects the application performance on recent many-core architectures. To reduce th...
Hiroki Matsutani, Michihiro Koibuchi, Hideharu Ama...
EUROCRYPT
2008
Springer
13 years 11 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai