Sciweavers

1398 search results - page 201 / 280
» The Real World Software Process
Sort
View
ETS
2000
IEEE
100views Hardware» more  ETS 2000»
15 years 2 months ago
Using computer-mediated communication to form a knowledge-building community with beginning teachers
This study investigated how different types of computer-mediated communication (CMC) such as asynchronous forums, synchronous forums and e-mail were used to support an alternative...
Brian Ferry, Julie Kiggins, Garry Hoban, Lori Lock...
MP
2002
110views more  MP 2002»
15 years 2 months ago
Robust optimization - methodology and applications
Abstract. Robust Optimization (RO) is a modeling methodology, combined with computational tools, to process optimization problems in which the data are uncertain and is only known ...
Aharon Ben-Tal, Arkadi Nemirovski
PE
2007
Springer
137views Optimization» more  PE 2007»
15 years 1 months ago
A prediction method for job runtimes on shared processors: Survey, statistical analysis and new avenues
Grid computing is an emerging technology by which huge numbers of processors over the world create a global source of processing power. Their collaboration makes it possible to pe...
Menno Dobber, Robert D. van der Mei, Ger Koole
161
Voted
ENTCS
2008
390views more  ENTCS 2008»
15 years 1 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
ICSOC
2010
Springer
15 years 29 days ago
Service Discovery Using Communication Fingerprints
A request to a service registry must be answered with a service that fits in several regards, including semantic compatibility, non-functional compatibility, and interface compati...
Olivia Oanea, Jan Sürmeli, Karsten Wolf