Sciweavers

4923 search results - page 768 / 985
» Software Risk Management
Sort
View
CIIT
2007
195views Communications» more  CIIT 2007»
15 years 4 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
VAMOS
2010
Springer
15 years 4 months ago
Using Collaborations to Encapsulate Features? An Explorative Study
A feature is a program characteristic visible to an end-user. Current research strives to encapsulate the implementation of a feature in a module. Jak is a language extension to Ja...
Martin Kuhlemann, Norbert Siegmund, Sven Apel
AVI
2004
15 years 4 months ago
SWAPit: a multiple views paradigm for exploring associations of texts and structured data
Visualization interfaces that offer multiple coordinated views on a particular set of data items are useful for navigating and exploring complex information spaces. In this paper ...
Andreas Becks, Christian Seeling
INTERACT
2003
15 years 4 months ago
Classification of Usability Problems (CUP) Scheme
: Defect classification can improve product quality and motivate process improvement. Several defect classification schemes have been developed and used with good results in softwa...
Ebba Thora Hvannberg, Effie Lai-Chong Law
WORM
2004
15 years 4 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu