Sciweavers

315 search results - page 17 / 63
» Claims Analysis
Sort
View
121
Voted
EWSN
2006
Springer
16 years 3 months ago
A Measurement-Based Analysis of the Interaction Between Network Layers in TinyOS
There have been a number of recent proposals for link and network-layer protocols in the sensor networking literature, each of which claims to be superior to other approaches. Howe...
Umberto Malesci, Samuel Madden
129
Voted
CEC
2009
IEEE
15 years 10 months ago
Theoretical analysis of rank-based mutation - combining exploration and exploitation
— Parameter setting is an important issue in the design of evolutionary algorithms. Recently, experimental work has pointed out that it is often not useful to work with a fixed ...
Pietro Simone Oliveto, Per Kristian Lehre, Frank N...
118
Voted
IWPC
2009
IEEE
15 years 10 months ago
Crosscutting patterns and design stability: An exploratory analysis
It is often claimed that inaccurate modularisation of crosscutting concerns hinders program comprehension and, as a consequence, leads to harmful software instabilities. However, ...
Eduardo Figueiredo, Bruno Carreiro da Silva, Cl&aa...
118
Voted
ICSM
2008
IEEE
15 years 10 months ago
Supporting software evolution analysis with historical dependencies and defect information
More than 90% of the cost of software is due to maintenance and evolution. Understanding the evolution of large software systems is a complex problem, which requires the use of va...
Marco D'Ambros
135
Voted
ACISP
2004
Springer
15 years 9 months ago
Analysis and Improvement of Micali's Fair Contract Signing Protocol
In PODC 2003, Micali presented a fair electronic exchange protocol for contract signing with an invisible trusted party [17]. The protocol was filed as a US patent No 5666420 in 1...
Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu