Sciweavers

1580 search results - page 100 / 316
» Non-Interference Through Determinism
Sort
View
ACSC
2006
IEEE
14 years 3 months ago
Identifying refactoring opportunities by identifying dependency cycles
The purpose of refactoring is to improve the quality of a software system by changing its internal design so that it is easier to understand or modify, or less prone to errors and...
Hayden Melton, Ewan D. Tempero
DSN
2006
IEEE
14 years 3 months ago
Assessing the Attack Threat due to IRC Channels
This practical experience report presents the results of an investigation into the threat of attacks associated with the chat medium IRC. A combination of simulated users (i.e., b...
Robert Meyer, Michel Cukier
E2EMON
2006
IEEE
14 years 3 months ago
Active Probing Approach for Fault Localization in Computer Networks
—Active probing is an active network monitoring technique that has potential for developing effective solutions for fault localization. In this paper we use active probing to pre...
Maitreya Natu, Adarshpal S. Sethi
HICSS
2006
IEEE
132views Biometrics» more  HICSS 2006»
14 years 3 months ago
The Impact of Use Situation and Mobility on the Acceptance of Mobile Ticketing Services
This paper presents results from a study of mobile ticketing service acceptance in public transportation. The theoretical background of the study was drawn from technology accepta...
Niina Mallat, Matti Rossi, Virpi Kristiina Tuunain...
IAT
2006
IEEE
14 years 3 months ago
A Labeled Graph Approach to Analyze Organizational Performance
Determining the performance of an organization is a must for both human and multi-agent organizations. The performance analysis enables organizations to uncover unexpected propert...
Mark Hoogendoorn, Jan Treur, Pinar Yolum