Sciweavers

347 search results - page 50 / 70
» Managing New and Remanufactured Products
Sort
View
COMSIS
2007
80views more  COMSIS 2007»
13 years 7 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
ACMSE
2007
ACM
13 years 11 months ago
Change propagations in the maintenance of kernel-based software with a study on Linux
As a software system evolves to accommodate new features and repair bugs, changes are needed. Software components are interdependent, changes made to one component can require cha...
Liguo Yu, Srini Ramaswamy
ERLANG
2008
ACM
13 years 9 months ago
Testing Erlang data types with quviq quickcheck
When creating software, data types are the basic bricks. Most of the time a programmer will use data types defined in library modules, therefore being tested by many users over ma...
Thomas Arts, Laura M. Castro, John Hughes
WPES
2005
ACM
14 years 29 days ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
COMPUTER
2002
91views more  COMPUTER 2002»
13 years 7 months ago
Representative Democracy and the Profession
the term refers in an abstract way to a process or institution under which government openly solicits, preserves, and fosters information about its citizens' interests. At the...
W. Neville Holmes