Sciweavers

8322 search results - page 1557 / 1665
» What Are We Looking for
Sort
View
MSR
2010
ACM
14 years 3 months ago
Validity of network analyses in Open Source Projects
—Social network methods are frequently used to analyze networks derived from Open Source Project communication and collaboration data. Such studies typically discover patterns in...
Roozbeh Nia, Christian Bird, Premkumar T. Devanbu,...
ICSM
2002
IEEE
14 years 3 months ago
Constraining Software Evolution
Software is multidimensional but the tools that support it are not. The lack of tool support causes the software artifacts representing different dimensions to evolve independentl...
Steven P. Reiss
ISCA
2002
IEEE
68views Hardware» more  ISCA 2002»
14 years 3 months ago
Timekeeping in the Memory System: Predicting and Optimizing Memory Behavior
Techniques for analyzing and improving memory referencing behavior continue to be important for achieving good overall program performance due to the ever-increasing performance g...
Zhigang Hu, Margaret Martonosi, Stefanos Kaxiras
SPAA
2010
ACM
14 years 2 months ago
Basic network creation games
We study a natural network creation game, in which each node locally tries to minimize its local diameter or its local average distance to other nodes, by swapping one incident ed...
Noga Alon, Erik D. Demaine, MohammadTaghi Hajiagha...
SACMAT
2009
ACM
14 years 2 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
« Prev « First page 1557 / 1665 Last » Next »