Sciweavers

1466 search results - page 219 / 294
» Completeness of the Authentication Tests
Sort
View
WSC
2007
13 years 10 months ago
Simulation tool for manpower forecast loading and resource leveling
Large scale / mega projects are lengthy complex endeavors that require significant planning by management, engineers and construction personnel to ensure the success of the projec...
Mikhail Hanna, Janaka Y. Ruwanpura
WSC
2007
13 years 10 months ago
Simulation of adaptive project management analytics
Typically, IT projects are delivered over-budget and behind schedule. In this paper, we explore the effects of common project management practices that contribute to these problem...
Léa Amandine Deleris, Sugato Bagchi, Shubir...
CASES
2008
ACM
13 years 9 months ago
Control flow optimization in loops using interval analysis
We present a novel loop transformation technique, particularly well suited for optimizing embedded compilers, where an increase in compilation time is acceptable in exchange for s...
Mohammad Ali Ghodrat, Tony Givargis, Alex Nicolau
ECOOP
2008
Springer
13 years 9 months ago
Computing Stack Maps with Interfaces
Abstract. Lightweight bytecode verification uses stack maps to annotate Java bytecode programs with type information in order to reduce the verification to type checking. This pape...
Frédéric Besson, Thomas P. Jensen, T...
ESEM
2008
ACM
13 years 9 months ago
Are good code reviewers also good at design review?
Software review is a necessity activity to build high reliability software in software development. In this paper, we experimentally analyze the difference in performance between ...
Hidetake Uwano, Akito Monden, Ken-ichi Matsumoto