Sciweavers

6608 search results - page 1197 / 1322
» On the Completeness of Model Checking
Sort
View
JGTOOLS
2008
189views more  JGTOOLS 2008»
15 years 4 months ago
Subtractive Shadows: A Flexible Framework for Shadow Level of Detail
Abstract. We explore the implications of reversing the process of shadow computation for real-time applications that model complex reflectance and lighting (such as that specified ...
Christopher DeCoro, Szymon Rusinkiewicz
JAR
2006
81views more  JAR 2006»
15 years 4 months ago
Verifying the SET Purchase Protocols
SET (Secure Electronic Transaction) is a suite of protocols proposed by a consortium of credit card companies and software corporations to secure ecommerce transactions. The Purcha...
Giampaolo Bella, Fabio Massacci, Lawrence C. Pauls...
JNW
2008
79views more  JNW 2008»
15 years 4 months ago
A Call Admission Control Protocol for Multimedia Cellular Networks
The performance of any cellular wireless network, as well as its revenue (number of customers using the network, and their degree of satisfaction) is determined to a great extent b...
Ayman Elnaggar, Mokhtar Aboelaze, Maan Musleh
JSW
2008
106views more  JSW 2008»
15 years 4 months ago
Factors that Significantly Impact the Implementation of an Agile Software Development Methodology
The Internet economy has altered the current rules of software engineering. Traditional development methodologies have proven too cumbersome to meet the rapidly changing requiremen...
Jeffrey A. Livermore
JSW
2008
104views more  JSW 2008»
15 years 4 months ago
Testing Software Assets of Framework-Based Product Families During Application Engineering Stage
An application framework provides reusable design and implementation for a family of software systems. At the application engineering stage, application developers extend framework...
Jehad Al-Dallal, Paul G. Sorenson
« Prev « First page 1197 / 1322 Last » Next »