Sciweavers

5030 search results - page 41 / 1006
» cases 2007
Sort
View
DAGSTUHL
2007
15 years 5 months ago
A Case for Deconstructing Hardware Transactional Memory Systems
Major hardware and software vendors are curious about transactional memory (TM), but are understandably cautious about committing to hardware changes. Our thesis is that deconstru...
Mark D. Hill, Derek Hower, Kevin E. Moore, Michael...
CASCON
2007
157views Education» more  CASCON 2007»
15 years 5 months ago
Threats on building models from CVS and Bugzilla repositories: the Mozilla case study
Information obtained by merging data extracted from problem reporting systems – such as Bugzilla – and versioning systems – such as Concurrent Version System (CVS) – is wi...
Kamel Ayari, Peyman Meshkinfam, Giuliano Antoniol,...
CN
2007
172views more  CN 2007»
15 years 4 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
COMPLEXITY
2007
151views more  COMPLEXITY 2007»
15 years 4 months ago
From complex conflicts to stable cooperation: Cases in environment and security
: Conflict is a dynamic and complex form of human interaction, often emerging from incompatible actions, values and goals, and consuming a considerable amount of resources. Conflic...
Jürgen Scheffran, Bruce Hannon
BIS
2006
105views Business» more  BIS 2006»
15 years 5 months ago
Describing Business Processes with Use Cases
Business processes can be described with diagrams, e.g. BPMN diagrams, or as text. Use cases are a text-based notation. They are semiformal: a business process is expressed as a s...
Jerzy R. Nawrocki, Tomasz Nedza, Miroslaw Ochodek,...