Sciweavers

1412 search results - page 60 / 283
» The Value of Outsourced Software
Sort
View
CCS
2008
ACM
13 years 10 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
VLSID
2002
IEEE
99views VLSI» more  VLSID 2002»
14 years 9 months ago
Input Space Adaptive Embedded Software Synthesis
This paper presents a novel technique, called input space adaptive software synthesis, for the energy and performance optimization of embedded software. The proposed technique is ...
Weidong Wang, Anand Raghunathan, Ganesh Lakshminar...
IAJIT
2010
154views more  IAJIT 2010»
13 years 7 months ago
Impact of CMMI Based Software Process Maturity on COCOMO II's Effort Estimation
: The software capability maturity model has become a popular model for enhancing software development processes with the goal of developing high-quality software within budget and...
Majed Al Yahya, Rodina Ahmad, Sai Lee
WCET
2010
13 years 6 months ago
Realism in Statistical Analysis of Worst Case Execution Times
This paper considers the use of Extreme Value Theory (EVT) to model worst-case execution times. In particular it considers the sacrifice that statistical methods make in the reali...
David Griffin, Alan Burns
IMDS
2007
80views more  IMDS 2007»
13 years 8 months ago
Effect of team diversity on software project performance
Purpose – This research seeks to investigate the relationship between knowledge diversity (KD) in software teams and project performance. Previous research has shown that member...
Ting-Peng Liang, Chih-Chung Liu, Tse-Min Lin, Bins...