Sciweavers

26354 search results - page 115 / 5271
» How we refactor, and how we know it
Sort
View
SIGITE
2004
ACM
14 years 3 months ago
How information technology professionals keep from being outsourced or offshored
This paper introduces the concept of the “vendible line” partitioning jobs in a company into those that are likely to be lost to outsourcing (onshore or offshore) and those th...
Ron Fulbright, Richard L. Routh
CINQ
2004
Springer
119views Database» more  CINQ 2004»
14 years 3 months ago
How to Quickly Find a Witness
The subfield of itemset mining is essentially a collection of algorithms. Whenever a new type of constraint is discovered, a specialized algorithm is proposed to handle it. All o...
Daniel Kifer, Johannes Gehrke, Cristian Bucila, Wa...
GECCO
2004
Springer
14 years 3 months ago
How to Overcome the Equivalent Mutant Problem and Achieve Tailored Selective Mutation Using Co-evolution
The use of Genetic Algorithms in evolution of mutants and test cases offers new possibilities in addressing some of the main problems of mutation testing. Most specifically the p...
Konstantinos Adamopoulos, Mark Harman, Robert M. H...
PKC
2004
Springer
150views Cryptology» more  PKC 2004»
14 years 3 months ago
Undeniable Signatures Based on Characters: How to Sign with One Bit
We present a new undeniable signature scheme which is based on the computation of characters. Our signature scheme offers the advantage of having an arbitrarily short signature. I...
Jean Monnerat, Serge Vaudenay
SEMWEB
2004
Springer
14 years 3 months ago
How to Build Google2Google - An (Incomplete) Recipe
Abstract. This talk explores aspects relevant for peer-to-peer search infrastructures, which we think are better suited to semantic web search than centralized approaches. It does ...
Wolfgang Nejdl