Sciweavers

1148 search results - page 134 / 230
» Software engineering considered harmful
Sort
View
129
Voted
COMSWARE
2008
IEEE
15 years 10 months ago
Tracking target using sensor networks: target detection and route activation under energy constraints
—In this paper we consider tracking a target moving in a 2D plane using a network of sensors, each of which is capable of detecting presence of the target in its vicinity and com...
Vaishali P. Sadaphal, Bijendra N. Jain
167
Voted
ICST
2008
IEEE
15 years 10 months ago
Prioritizing User-Session-Based Test Cases for Web Applications Testing
Web applications have rapidly become a critical part of business for many organizations. However, increased usage of web applications has not been reciprocated with corresponding ...
Sreedevi Sampath, Renée C. Bryce, Gokulanan...
124
Voted
ISPASS
2007
IEEE
15 years 10 months ago
Complete System Power Estimation: A Trickle-Down Approach Based on Performance Events
This paper proposes the use of microprocessor performance counters for online measurement of complete system power consumption. While past studies have demonstrated the use of per...
W. Lloyd Bircher, Lizy K. John
124
Voted
ISPW
2007
IEEE
15 years 10 months ago
Representing Process Variation with a Process Family
The formalization of process definitions has been an invaluable aid in many domains. However, noticeable variations in processes start to emerge as precise details are added to pro...
Borislava I. Simidchieva, Lori A. Clarke, Leon J. ...
158
Voted
ICSEA
2007
IEEE
15 years 10 months ago
An Access Control Metamodel for Web Service-Oriented Architecture
— With the mutual consent to use WSDL (Web Service Description Language) to describe web service interfaces and SOAP as the basic communication protocol, the cornerstone for web ...
Christian Emig, Frank Brandt, Sebastian Abeck, J&u...