Sciweavers

26354 search results - page 159 / 5271
» How we refactor, and how we know it
Sort
View
IWSEC
2007
Springer
14 years 4 months ago
How to Find Many Collisions of 3-Pass HAVAL
The hash function HAVAL is an Australian extension of well known Merkle-Damg˚ard hash functions such as MD4 and MD5. It has three variants, 3-, 4- and 5-pass HAVAL. On 3-pass HAVA...
Kazuhiro Suzuki, Kaoru Kurosawa
SEMWEB
2007
Springer
14 years 4 months ago
How Useful Are Natural Language Interfaces to the Semantic Web for Casual End-Users?
Natural language interfaces offer end-users a familiar and convenient option for querying ontology-based knowledge bases. Several studies have shown that they can achieve high ret...
Esther Kaufmann, Abraham Bernstein
CLUSTER
2006
IEEE
14 years 4 months ago
FAIL-MPI: How Fault-Tolerant Is Fault-Tolerant MPI?
One of the topics of paramount importance in the development of Cluster and Grid middleware is the impact of faults since their occurrence in Grid infrastructures and in large-sca...
William Hoarau, Pierre Lemarinier, Thomas Hé...
MSR
2005
ACM
14 years 4 months ago
Text mining for software engineering: how analyst feedback impacts final results
The mining of textual artifacts is requisite for many important activities in software engineering: tracing of requirements; retrieval of components from a repository; location of...
Jane Huffman Hayes, Alex Dekhtyar, Senthil Karthik...
ICSE
2005
IEEE-ACM
14 years 3 months ago
How to teach software modeling
To enhance motivation of students to study software engineering, some way of finding balance between the scientific aspect and the practical aspect of software engineering is re...
Tetsuo Tamai