Sciweavers

5843 search results - page 1061 / 1169
» Software Security in Practice
Sort
View
GROUP
2010
ACM
13 years 8 months ago
Searching for reputable source code on the web
Looking for source code on the Web is a common practice among software developers. Previous research has shown that developers use social cues over technical cues to evaluate sour...
Rosalva E. Gallardo-Valencia, Phitchayaphong Tanti...
IAT
2010
IEEE
13 years 8 months ago
Event Study Approach for Validating Agent-Based Trading Simulations
In this paper, we introduce how one can validate an event-centric trading simulation platform that is built with multi-agent technology. The issue of validation is extremely import...
Shih-Fen Cheng
RCIS
2010
13 years 8 months ago
A conceptual model and process for client-driven agile requirements prioritization
Continuous customer-centric requirements reprioritization is essential in successfully performing agile software development. Yet, in the agile RE literature, very little is known ...
Zornitza Racheva, Maya Daneva, Andrea Herrmann, Ro...
SAMOS
2010
Springer
13 years 8 months ago
CLI-based compilation flows for the C language
Abstract--Embedded systems contain a wide variety of processors. Economical and technological factors favor systems made of a combination of diverse but programmable processors. So...
Erven Rohou, Andrea C. Ornstein, Marco Cornero
HCI
2009
13 years 8 months ago
An Open Source Framework for Real-Time, Incremental, Static and Dynamic Hand Gesture Learning and Recognition
Real-time, static and dynamic hand gesture learning and recognition makes it possible to have computers recognize hand gestures naturally. This creates endless possibilities in the...
Todd C. Alexander, Hassan S. Ahmed, Georgios C. An...
« Prev « First page 1061 / 1169 Last » Next »