Sciweavers

19986 search results - page 3752 / 3998
» On Designing Software Architectures
Sort
View
USS
2010
15 years 1 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
150
Voted
EDM
2009
124views Data Mining» more  EDM 2009»
15 years 1 months ago
Detecting and Understanding the Impact of Cognitive and Interpersonal Conflict in Computer Supported Collaborative Learning Envi
This paper presents a model which can automatically detect a variety of student speech acts as students collaborate within a computer supported collaborative learning environment. ...
David Prata, Ryan Baker, Evandro Costa, Carolyn Pe...
EKNOW
2009
15 years 1 months ago
Visual Middle-Out Modeling of Problem Spaces
Modeling is a complex and central activity in many domains. Domain experts and designers usually work by drawing and create models from the middle-out; however, visual and middle-...
Andrea Valente
ENASE
2009
151views Hardware» more  ENASE 2009»
15 years 1 months ago
Coupling Metrics for Aspect-Oriented Programming: A Systematic Review of Maintainability Studies
Over the last few years, a growing number of studies have explored how Aspect-Oriented Programming (AOP) might impact software maintainability. Most of the studies use coupling met...
Rachel Burrows, Alessandro Garcia, François...
GLOBECOM
2009
IEEE
15 years 1 months ago
Time-Critical Data Dissemination in Cooperative Peer-to-Peer Systems
How to rapidly disseminate a large-sized file to many recipients is a fundamental problem in many applications, such as updating software patches and distributing large scientific ...
Chi-Jen Wu, Cheng-Ying Li, Kai-Hsiang Yang, Jan-Mi...
« Prev « First page 3752 / 3998 Last » Next »