Sciweavers

26354 search results - page 146 / 5271
» How we refactor, and how we know it
Sort
View
CORR
2007
Springer
131views Education» more  CORR 2007»
13 years 10 months ago
How to use the Scuba Diving metaphor to solve problem with neutrality ?
Abstract. We proposed a new search heuristic using the scuba diving metaphor. This approach is based on the concept of evolvability and tends to exploit neutrality which exists in ...
Philippe Collard, Sébastien Vérel, M...
JSAC
2007
105views more  JSAC 2007»
13 years 10 months ago
What and how much to gain by spectrum agility?
— Static spectrum allocation prohibits radio devices from using spectral bands designated for others. As a result, some bands are under-utilized while other bands are over-popula...
Chun-Ting Chou, Sai Shankar N., Hyoil Kim, Kang G....
TSE
2010
280views more  TSE 2010»
13 years 8 months ago
How Reliable Are Systematic Reviews in Empirical Software Engineering?
BACKGROUND – the systematic review is becoming a more commonly employed research instrument in empirical software engineering. Before undue reliance is placed on the outcomes of...
Stephen G. MacDonell, Martin J. Shepperd, Barbara ...
CORR
2011
Springer
193views Education» more  CORR 2011»
13 years 2 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...
CCS
2011
ACM
12 years 10 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj