Sciweavers

449 search results - page 27 / 90
» What is Initiative
Sort
View
IEEEARES
2008
IEEE
14 years 2 months ago
haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism
A secure logging mechanism named haplog is proposed. In essence, haplog uses only one-way hash functions to achieve the security and functional requirements of logging. This makes...
Chih-Yin Lin
FUNGAMES
2008
13 years 8 months ago
Pervasive Mobile Games - A New Mindset for Players and Developers
Pervasive games are an emerging new game genre, which includes context information as an integral part of the game. These games differ from traditional games in that they expand sp...
Hannu Korhonen, Hannamari Saarenpää, Jan...
ICSM
2009
IEEE
14 years 2 months ago
Searching and skimming: An exploratory study
Source code search is an important activity for programmers working on a change task to a software system. As part of a larger project to improve tool support for finding informa...
Jamie Starke, Chris Luce, Jonathan Sillito
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 5 months ago
Property Testing via Set-Theoretic Operations
: Given two testable properties P1 and P2, under what conditions are the union, intersection or set-difference of these two properties also testable? We initiate a systematic study...
Victor Chen, Madhu Sudan, Ning Xie
TOOLS
2000
IEEE
13 years 11 months ago
Applying the Lessons of eXtreme Programming
Although eXtreme Programming has been explained by Kent Beck[1], there are many benefits to adopting eXtreme Programming (XP) practices in other development processes. The benefit...
Pete McBreen