Sciweavers

3792 search results - page 75 / 759
» Techniques for Trusted Software Engineering
Sort
View
KBSE
2010
IEEE
13 years 8 months ago
Tag and prune: a pragmatic approach to software product line implementation
To realise variability at the code level, product line methods classically advocate usage of inheritance, components, frameworks, aspects or generative techniques. However, these ...
Quentin Boucher, Andreas Classen, Patrick Heymans,...
EUROMICRO
2003
IEEE
14 years 3 months ago
Polishing: A Technique to Reduce Variations in Cached Layer-Encoded Video
In this paper we present polishing, a novel technique to maximize the playback utility of a streamed layer-encoded video. Polishing reduces the amount of layer variations in a cac...
Michael Zink, Oliver Heckmann, Jens Schmitt, Andre...
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
14 years 3 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
JCC
2011
154views more  JCC 2011»
13 years 27 days ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
APSEC
1999
IEEE
14 years 2 months ago
Software Development Based on Software Pattern Evolution
This paper discusses a technique to model software patternsfor supporting pattern based software development. Software development can be considered as the evolution of the artifa...
Takashi Kobayashi, Motoshi Saeki