Sciweavers

10500 search results - page 1980 / 2100
» Documentation for
Sort
View
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
ACSC
2005
IEEE
14 years 1 months ago
A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies
Curriculum based on internetworking devices is primarily based on the Command Line Interface (CLI) and case studies. However a single CLI command may produce output that is not on...
Stanislaw P. Maj, G. Kohli, T. Fetherston
AGILEDC
2005
IEEE
14 years 1 months ago
Costs of Compliance: Agile in an Inelastic Organization
Doing agile development in a relatively inelastic environment, where policies and procedures are virtually unchangeable, creates an impedance mismatch between the agile team and i...
John J. Cunningham
AGILEDC
2005
IEEE
14 years 1 months ago
Experiences Integrating Sophisticated User Experience Design Practices into Agile Processes
Most significant software processes involve a wide range of disciplines, from programming to testing, and from documentation to database development. Unfortunately, agile processe...
Paul Hodgetts
ECBS
2005
IEEE
88views Hardware» more  ECBS 2005»
14 years 1 months ago
Integrative Architecture Elicitation for Large Computer Based Systems
Large and complex computer based systems are the result of an evolution process which may take many years. Heterogeneity is an important characteristic of such systems: During the...
Peter Tabeling, Bernhard Gröne
« Prev « First page 1980 / 2100 Last » Next »