Sciweavers

1240 search results - page 218 / 248
» Improving Memory Management Security for C and C
Sort
View
EOR
2010
62views more  EOR 2010»
13 years 8 months ago
Residual income and value creation: An investigation into the lost-capital paradigm
This paper presents a new way of measuring residual income, originally introduced by Magni (2000a,b,c, 2001a,b, 2003). Contrary to the standard residual income, the capital charge...
Carlo Alberto Magni
IJIPT
2008
81views more  IJIPT 2008»
13 years 8 months ago
Towards seamless source mobility in SSM: design and evaluation of the Tree Morphing protocol
: Multimedia networking in the near future is expected to be dominated by group applications such as IPTV, MMORPGs, and video conferencing. Hand in hand with new service offers, th...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...
JSW
2008
220views more  JSW 2008»
13 years 8 months ago
Empirical validation of Software development effort multipliers of Intermediate COCOMO Model
Intermediate COCOMO Model computes effort as a function of program size and a set of cost drivers. Effort adjustment factor (EAF) is calculated using 15 cost drivers. EAF is an imp...
M. J. Basavaraj, K. C. Shet
DSS
2007
124views more  DSS 2007»
13 years 8 months ago
Access control in collaborative commerce
Corporate collaboration allows organizations to improve the efficiency and quality of their business activities. It may occur as a workflow collaboration, a supply chain collabora...
Eldon Y. Li, Timon C. Du, Jacqueline W. Wong
TPDS
2008
130views more  TPDS 2008»
13 years 8 months ago
NFS-CD: Write-Enabled Cooperative Caching in NFS
We present the Network File System with Cluster Delegation (NFS-CD), an enhancement to the NFSv4 that reduces server load and increases the scalability of distributed file systems ...
Alexandros Batsakis, Randal C. Burns