Sciweavers

316 search results - page 49 / 64
» Case Study: Extreme Programming in a University Environment
Sort
View
IPPS
2003
IEEE
14 years 27 days ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
TACAS
2005
Springer
124views Algorithms» more  TACAS 2005»
14 years 1 months ago
Localization and Register Sharing for Predicate Abstraction
ion Himanshu Jain1,2 , Franjo Ivanˇci´c1 , Aarti Gupta1 , and Malay K. Ganai1 1 NEC Laboratories America, Inc., 4 Independence Way, Princeton, NJ 08540 2 School of Computer Scien...
Himanshu Jain, Franjo Ivancic, Aarti Gupta, Malay ...
INFOCOM
2003
IEEE
14 years 27 days ago
Measurement-Based Optimization Techniques for Bandwidth-Demanding Peer-to-Peer Systems
— Measurement-based optimization is one important strategy to improve the performance of bandwidth-demanding peer-to-peer systems. However, to date, we have little quantitative k...
T. S. Eugene Ng, Yang-Hua Chu, Sanjay G. Rao, Kunw...
ELPUB
2008
ACM
13 years 9 months ago
An Overview Of The Development Of Open Access Journals And Repositories In Mexico
It has been noted that one of the potential benefits of Open Access is the increase in visibility for research output from less developed countries. However little is known about ...
Isabel Galina, Joaquín Giménez
TPHOL
1997
IEEE
13 years 11 months ago
An Isabelle-Based Theorem Prover for VDM-SL
This note lists references which address –in some way or another– the problems relating to formal manipulation of logical expressions where terms can fail to denote. Reference...
Sten Agerholm, Jacob Frost