Sciweavers

499 search results - page 28 / 100
» Why neighbor-joining works
Sort
View
ICDCSW
2007
IEEE
14 years 4 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
AGILEDC
2005
IEEE
14 years 3 months ago
Case Study of Customer Input For a Successful Product
Both agile development and User Centered Design stress collaboration between customers and product teams, but getting these methodologies to work well together is not easy. This p...
Lynn Miller
WISER
2004
ACM
14 years 3 months ago
Aikido and software engineering
Aikido is a martial art whose core philosophy is about conflict resolution and taking care of our opponents and ourselves. My experience, and the experience of fellow aikidoists w...
David Socha
GI
2004
Springer
14 years 3 months ago
Developing Web Applications for Small and Medium-sized Enterprises - An Experience Report
: In this paper we describe one of the authors’ experiences working for an IT service provider in an SME environment. The paper starts with an analysis of the factors typical for...
Markus Aleksy, Ralf Gitzel, Michael Schwind
ICDCS
2003
IEEE
14 years 3 months ago
Group Membership and Wide-Area Master-Worker Computations
Group communications systems have been designed to provide an infrastructure for fault-tolerance in distributed systems, including wide-area systems. In our work on master-worker ...
Kjetil Jacobsen, Xianan Zhang, Keith Marzullo