Sciweavers

1644 search results - page 160 / 329
» Finding Dominators in Practice
Sort
View
WLP
2004
Springer
14 years 2 months ago
Effective Modeling with Constraints
Constraint programming provides a declarative approach to solving combinatorial (optimization) problems. The user just states the problem as a constraint satisfaction problem (CSP)...
Roman Barták
XPU
2004
Springer
14 years 2 months ago
Human Aspects of Software Engineering: The Case of Extreme Programming
As with to other agile methods, which value "Individuals and interactions over processes and tools" (http://agilemanifesto.org/), Extreme Programming (XP) cares about th...
Orit Hazzan, James E. Tomayko
ACSAC
2003
IEEE
14 years 2 months ago
A Multi-View Tool for Checking the Security Semantics of Router Configurations
Routers are critical components of IP networks, but hardly any tool support for analyzing their security exists to date. We have developed such a tool, named CROCODILE, that track...
Holger Peine, Reinhard Schwarz
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
14 years 2 months ago
SME E-Procurement Adoption in Hong Kong - The Roles of Power, Trust and Value
The objective of this research is to test a model of electronic procurement (e-procurement) adoption behavior by Small- to Medium-sized Enterprises (SME). We investigate the pheno...
Joyce K. Y. Chan, Matthew K. O. Lee
CAV
2003
Springer
156views Hardware» more  CAV 2003»
14 years 2 months ago
Abstraction and BDDs Complement SAT-Based BMC in DiVer
ion and BDDs Complement SAT-based BMC in DiVer Aarti Gupta1, Malay Ganai1 , Chao Wang2, Zijiang Yang1, Pranav Ashar1 1 NEC Laboratories America, Princeton, NJ, U.S.A. 2 University ...
Aarti Gupta, Malay K. Ganai, Chao Wang, Zijiang Ya...