Sciweavers

1631 search results - page 38 / 327
» Extreme Programming - Back to Basics
Sort
View
IEEEARES
2007
IEEE
15 years 8 months ago
Web Engineering Security: Essential Elements
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essent...
William Bradley Glisson, Ray Welland
WINE
2009
Springer
151views Economy» more  WINE 2009»
15 years 7 months ago
Consistent Continuous Trust-Based Recommendation Systems
Abstract. The goal of a trust-based recommendation system is to generate personalized recommendations from known opinions and trust relationships. Prior work introduced the axiomat...
Ola Rozenfeld, Moshe Tennenholtz
MICRO
1992
IEEE
124views Hardware» more  MICRO 1992»
15 years 6 months ago
A shape matching approach for scheduling fine-grained parallelism
- We present a compilation technique for scheduling parallelism on fine grained asynchronous MIMD systems. The shape scheduling algorithm is introduced that utilizes the flexibilit...
Brian A. Malloy, Rajiv Gupta, Mary Lou Soffa
MOC
2002
70views more  MOC 2002»
15 years 2 months ago
Positivity preserving finite element approximation
We consider finite element operators defined on "rough" functions in a bounded polyhedron in RN . Insisting on preserving positivity in the approximations, we discover a...
Ricardo H. Nochetto, Lars B. Wahlbin
CSL
2000
Springer
15 years 6 months ago
Interactive Programs in Dependent Type Theory
We introduce basic concepts from object-oriented programming into dependent type theory based on the idea of modelling objects as interactive programs. We consider methods, interf...
Peter Hancock, Anton Setzer