Sciweavers

1631 search results - page 157 / 327
» Extreme Programming - Back to Basics
Sort
View
CP
2009
Springer
16 years 3 months ago
Failed Value Consistencies for Constraint Satisfaction
In constraint satisfaction, basic inferences rely on some properties of constraint networks, called consistencies, that allow the identification of inconsistent instantiations (als...
Christophe Lecoutre, Olivier Roussel
CHI
2003
ACM
16 years 2 months ago
Kana no senshi (kana warrior): a new interface for learning Japanese characters
This paper presents the design and testing of Kana Warrior, a new interface for basic Japanese character recognition based on a game-style user interface. Kana Warrior is a game d...
Kristen Stubbs
ER
2009
Springer
166views Database» more  ER 2009»
15 years 9 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
101
Voted
GRC
2007
IEEE
15 years 8 months ago
Structured Writing with Granular Computing Strategies
— Granular computing unifies structured thinking, structured problem solving and structured information processing. In order to see the flexibility and universal applicability ...
Yiyu Yao
102
Voted
IEEEICCI
2007
IEEE
15 years 8 months ago
On Experiments for Measuring Cognitive Weights for Software Control Structures
Shao and Wang have proposed a cognitive complexity measure[8] as a metric that can be used for estimating the comprehension effort for understanding software written in imperative...
Volker Gruhn, Ralf Laue