Sciweavers

832 search results - page 145 / 167
» Effect of Malicious Synchronization
Sort
View
IJSI
2008
170views more  IJSI 2008»
13 years 9 months ago
Applying Value-Based Software Process: An ERP Example
Abstract Commercial organizations increasingly need software processes sensitive to business value, quick to apply, supportive of multi-stakeholder collaboration, and capable of ea...
LiGuo Huang, Barry W. Boehm, Hao Hu, Jian Lü,...
IJSEKE
2006
138views more  IJSEKE 2006»
13 years 9 months ago
Towards Automatic Establishment of Model Dependencies Using Formal Concept Analysis
tion and alteration of software models at different levels of abstraction. These modifications are usually performed independently, but the objects to which they are applied to, ar...
Igor Ivkovic, Kostas Kontogiannis
JUCS
2008
143views more  JUCS 2008»
13 years 9 months ago
Defining Tasks, Domains and Conversational Acts in CSCW Systems: the SPACE-DESIGN Case Study
: Most of the current academic and professional work requires collaboration between the members of a working group. Groupware tools play a prevailing role in supporting this collab...
Rafael Duque, Jesús Gallardo, Crescencio Br...
PPL
2008
96views more  PPL 2008»
13 years 9 months ago
A Hybrid Shared Memory Execution Model for a Data Parallel Language with I/O
Execution of programs with data parallel language constructs is either based on the fork/join or on the SPMD model. Whereas the former executes a program sequentially and confines...
Clemens Grelck, Steffen Kuthe, Sven-Bodo Scholz
SIGIR
2008
ACM
13 years 9 months ago
Algorithmic mediation for collaborative exploratory search
We describe a new approach to information retrieval: algorithmic mediation for intentional, synchronous collaborative exploratory search. Using our system, two or more users with ...
Jeremy Pickens, Gene Golovchinsky, Chirag Shah, Pe...