Sciweavers

353 search results - page 37 / 71
» The C Hackers Guide
Sort
View
MIDDLEWARE
2005
Springer
14 years 3 months ago
Middleware for protocol-based coordination in dynamic networks
Pervasive and ad hoc computing applications are frequently deployed in dynamic networks. Due to mobility of the computing nodes, their unreliability, or a limited communication ra...
Kurt Schelfthout, Danny Weyns, Tom Holvoet
RE
2005
Springer
14 years 3 months ago
Using Occurrence Properties of Defect Report Data to Improve Requirements
Defect reports generated for faults found during testing provide a rich source of information regarding problematic phrases used in requirements documents. These reports indicate ...
Kimberly S. Wasson, Kendra N. Schmid, Robyn R. Lut...
ASSETS
2004
ACM
14 years 3 months ago
Nonvisual tool for navigating hierarchical structures
The hierarchical structure of a program can be quite complex. As such, many Integrated Development Environments (IDEs) provide graphical representations of program structure at di...
Ann C. Smith, Justin S. Cook, Joan M. Francioni, A...
EUROPKI
2004
Springer
14 years 3 months ago
On the Use of Weber Polynomials in Elliptic Curve Cryptography
Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
CGO
2003
IEEE
14 years 3 months ago
Adaptive Online Context-Sensitive Inlining
As current trends in software development move toward more complex object-oriented programming, inlining has become a vital optimization that provides substantial performance impr...
Kim M. Hazelwood, David Grove