Sciweavers

1145 search results - page 73 / 229
» Using dependency models to manage complex software architect...
Sort
View
133
Voted
MSWIM
2006
ACM
15 years 10 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
ASWEC
2000
IEEE
15 years 8 months ago
Software Evolution in Componentware-A Practical Approach
Industrial software projects are not based on a top-down development process relying on refinement but use a more iterative and incremental approach with respect to changing requ...
Andreas Rausch
144
Voted
ISSRE
2007
IEEE
15 years 5 months ago
Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software
This paper describes a study performed in an industrial setting that attempts to build predictive models to identify parts of a Java system with a high probability of fault. The s...
Erik Arisholm, Lionel C. Briand, Magnus Fuglerud
BIRTHDAY
2004
Springer
15 years 7 months ago
Basic LMS Architecture for Learner-Centric LearnFlows or How Reusable Learning Objects Fit into Co-Constructivist Learning Proce
The discussions about learning management systems and reusable learning objects primarily focus on technical standardization issues. Standards such as SCORM or LTSC-LOM will yield...
Wolfgang F. Finke
209
Voted
HPDC
2008
IEEE
15 years 10 months ago
Harmony: an execution model and runtime for heterogeneous many core systems
The emergence of heterogeneous many core architectures presents a unique opportunity for delivering order of magnitude performance increases to high performance applications by ma...
Gregory F. Diamos, Sudhakar Yalamanchili