Sciweavers

26354 search results - page 161 / 5271
» How we refactor, and how we know it
Sort
View
EUROCRYPT
1998
Springer
14 years 2 months ago
How to Improve an Exponentiation Black-Box
Abstract. In this paper we present a method for improving the performance of RSA-type exponentiations. The scheme is based on the observation that replacing the exponent d by d = d...
Gérard D. Cohen, Antoine Lobstein, David Na...
ICSE
1998
IEEE-ACM
14 years 2 months ago
The Ramp-Up Problem in Software Projects: A Case Study of How Software Immigrants Naturalize
Joining a software development team is like moving to a new country to start employment; the immigrant has a lot to learn about the job, the local customs, and sometimes a new lan...
Susan Elliott Sim, Richard C. Holt
ICDCS
1996
IEEE
14 years 2 months ago
How to Recover Efficiently and Asynchronously when Optimism Fails
We propose a new algorithm for recovering asynchronously from failures in a distributed computation. Our algorithm is based on two novel concepts - a fault-tolerant vector clock t...
Om P. Damani, Vijay K. Garg
ICDCS
2010
IEEE
14 years 2 months ago
How Wireless Power Charging Technology Affects Sensor Network Deployment and Routing
—As wireless power charging technology emerges, some basic principles in sensor network design are changed accordingly. Existing sensor node deployment and data routing strategie...
Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang
ESEM
2007
ACM
14 years 2 months ago
How Software Designs Decay: A Pilot Study of Pattern Evolution
A common belief is that software designs decay as systems evolve. This research examines the extent to which software designs actually decay by studying the aging of design patter...
Clemente Izurieta, James M. Bieman