Sciweavers

2608 search results - page 510 / 522
» Subjects, Models, Languages, Transformations
Sort
View
PODS
2010
ACM
228views Database» more  PODS 2010»
13 years 9 months ago
Capturing missing tuples and missing values
Databases in real life are often neither entirely closed-world nor entirely open-world. Indeed, databases in an enterprise are typically partially closed, in which a part of the d...
Wenfei Fan, Floris Geerts
SIMUTOOLS
2008
13 years 8 months ago
Simulating SMEPP middleware
Embedded Peer-to-Peer Systems (EP2P) represent a new challenge in the development of software for distributed systems. The main objective of the SMEPP (Secure Middleware for Embed...
Javier Barbarán, Carlos Bonilla, Jose &Aacu...
JSS
2000
85views more  JSS 2000»
13 years 7 months ago
An experimental comparison of reading techniques for defect detection in UML design documents
The basic motivation for software inspections is to detect and remove defects before they propagate to subsequent development phases where their detection and removal becomes more...
Oliver Laitenberger, Colin Atkinson, Maud Schlich,...
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
SIGOPS
2010
130views more  SIGOPS 2010»
13 years 5 months ago
Storing and accessing live mashup content in the cloud
Today’s Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of repli...
Krzysztof Ostrowski, Ken Birman