Sciweavers

2048 search results - page 331 / 410
» Intelligent search techniques for large software systems
Sort
View
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
15 years 2 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
SIGSOFT
2005
ACM
16 years 5 months ago
Automatic generation of suggestions for program investigation
Before performing a modification task, a developer usually has to investigate the source code of a system to understand how to carry out the task. Discovering the code relevant to...
Martin P. Robillard
UIST
1999
ACM
15 years 9 months ago
WEST: A Web Browser for Small Terminals
We describe WEST, a WEb browser for Small Terminals, that aims to solve some of the problems associated with accessing web pages on hand-held devices. Through a novel combination ...
Staffan Björk, Lars Erik Holmquist, Johan Red...
158
Voted
ICSE
2009
IEEE-ACM
15 years 11 months ago
Automated testing of healthcare document transformations in the PICASSO interoperability platform
In every application domain, achieving interoperability among heterogenous information systems is a crucial challenge and alliances are formed to standardize data-exchange formats...
Massimo Pascale, Marcello Roselli, Umberto Rugani,...
126
Voted
CSMR
2009
IEEE
15 years 11 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou