Sciweavers

5488 search results - page 999 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
AGENTS
2001
Springer
15 years 9 months ago
A fuzzy model of reputation in multi-agent systems
Agents are intended to interact in open systems where the knowledge about others (reputation) is incomplete and uncertain. Also, this knowledge about other agents is subjective si...
Javier Carbo Rubiera, José M. Molina L&oacu...
OOPSLA
2001
Springer
15 years 9 months ago
Regression Test Selection for Java Software
Regression testing is applied to modified software to provide confidence that the changed parts behave as intended and that the unchanged parts have not been adversely affected ...
Mary Jean Harrold, James A. Jones, Tongyu Li, Dong...
ASPLOS
2000
ACM
15 years 9 months ago
Architectural Support for Fast Symmetric-Key Cryptography
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides ...
Jerome Burke, John McDonald, Todd M. Austin
OOPSLA
1999
Springer
15 years 8 months ago
Age-Based Garbage Collection
Modern generational garbage collectors look for garbage among the young objects, because they have high mortality; however, these objects include the very youngest objects, which ...
Darko Stefanovic, Kathryn S. McKinley, J. Eliot B....
128
Voted
OOPSLA
1999
Springer
15 years 8 months ago
Detecting Defects in Object-Oriented Designs: Using Reading Techniques to Increase Software Quality
Inspections can be used to identify defects in software artifacts. In this way, inspection methods help to improve software quality, especially when used early in software develop...
Guilherme Travassos, Forrest Shull, Michael Freder...