Sciweavers

4923 search results - page 768 / 985
» Software Risk Management
Sort
View
CIIT
2007
195views Communications» more  CIIT 2007»
13 years 11 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
VAMOS
2010
Springer
13 years 11 months ago
Using Collaborations to Encapsulate Features? An Explorative Study
A feature is a program characteristic visible to an end-user. Current research strives to encapsulate the implementation of a feature in a module. Jak is a language extension to Ja...
Martin Kuhlemann, Norbert Siegmund, Sven Apel
AVI
2004
13 years 11 months ago
SWAPit: a multiple views paradigm for exploring associations of texts and structured data
Visualization interfaces that offer multiple coordinated views on a particular set of data items are useful for navigating and exploring complex information spaces. In this paper ...
Andreas Becks, Christian Seeling
INTERACT
2003
13 years 11 months ago
Classification of Usability Problems (CUP) Scheme
: Defect classification can improve product quality and motivate process improvement. Several defect classification schemes have been developed and used with good results in softwa...
Ebba Thora Hvannberg, Effie Lai-Chong Law
WORM
2004
13 years 11 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu