Sciweavers

631 search results - page 88 / 127
» Why Model
Sort
View
CMOT
2002
112views more  CMOT 2002»
13 years 8 months ago
Finding Optimal Targets for Change Agents: A Computer Simulation of Innovation Diffusion
We introduce a diffusion of innovation model based on a network threshold approach. Realistic network and threshold data were gathered regarding the diffusion of new software tool...
Dirk Maienhofer, Thomas A. Finholt
JAIR
2010
147views more  JAIR 2010»
13 years 3 months ago
Cause Identification from Aviation Safety Incident Reports via Weakly Supervised Semantic Lexicon Construction
The Aviation Safety Reporting System collects voluntarily submitted reports on aviation safety incidents to facilitate research work aiming to reduce such incidents. To effectivel...
Muhammad Arshad Ul Abedin, Vincent Ng, Latifur Kha...
TSE
2010
102views more  TSE 2010»
13 years 3 months ago
Understanding Exception Handling: Viewpoints of Novices and Experts
Several recent studies indicate that many industrial applications exhibit poor quality in the design of exception-handling. To improve the quality of error-handling, we need to und...
Hina Shah, Carsten Görg, Mary Jean Harrold
FASE
2012
Springer
12 years 4 months ago
Cohesive and Isolated Development with Branches
The adoption of distributed version control (DVC), such as Git and Mercurial, in open-source software (OSS) projects has been explosive. Why is this and how are projects using DVC?...
Earl T. Barr, Christian Bird, Peter C. Rigby, Abra...
CTRSA
2007
Springer
184views Cryptology» more  CTRSA 2007»
14 years 2 months ago
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function
FORK-256 is a hash function presented at FSE 2006. Whereas SHA-like designs process messages in one stream, FORK-256 uses four parallel streams for hashing. In this article, we pre...
Florian Mendel, Joseph Lano, Bart Preneel