Sciweavers

3737 search results - page 636 / 748
» Knowledge Management and Promises
Sort
View
ISESE
2005
IEEE
14 years 1 months ago
Cloning by accident: an empirical study of source code cloning across software systems
One of the key goals of open source development is the sharing of knowledge, experience, and solutions that pertain to a software system and its problem domain. Source code clonin...
Raihan Al-Ekram, Cory Kapser, Richard C. Holt, Mic...
ISESE
2005
IEEE
14 years 1 months ago
Exploratory testing: a multiple case study
Exploratory testing (ET) – simultaneous learning, test design, and test execution – is an applied practice in industry but lacks research. We present the current knowledge of ...
Juha Itkonen, Kristian Rautiainen
WORDS
2005
IEEE
14 years 1 months ago
Towards Self-Healing Systems via Dependable Architecture and
Self-healing systems focus on how to reducing the complexity and cost of the management of dependability policies and mechanisms without human intervention. This position paper pr...
Hong Mei, Gang Huang, Wei-Tek Tsai
SACMAT
2005
ACM
14 years 1 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
SASN
2005
ACM
14 years 1 months ago
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Rec...
Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi ...