Sciweavers

IEEECIT
2006
IEEE
14 years 6 months ago
Integrating Configuration Management and Process Management Based on Life Cycle Control
Currently Configuration Management (CM) tool and Process Management (PM) tool are both largely applied in software organizations. However, neither of them can effectively support ...
Xin Peng, Wenyun Zhao, Chongxiang Zhu
IEEECIT
2006
IEEE
14 years 6 months ago
Telemedicine Imaging Collaboration System with Virtual Common Information Space
Fumio Okuyama, Takenori Hirano, Yuusuke Nakabayasi...
IEEECIT
2006
IEEE
14 years 6 months ago
A Complexity Metrics Set for Large-Scale Object-Oriented Software Systems
Although traditional software metrics have widely been applied to practical software projects, they have insufficient abilities to measure a large-scale system’s complexity at h...
Yutao Ma, Keqing He, Dehui Du, Jing Liu, Yulan Yan
IEEECIT
2006
IEEE
14 years 6 months ago
The Partitioning Methodology in Hardware/Software Co-Design Using Extreme Programming: Evaluation through the Lego Robot Project
This paper argues about the partitioning in hardware/software co-design and suggests the methodology applying extreme programming to complement the co-design. This approach, contr...
Heeseo Chae, Dong-hyun Lee, Jiyong Park, Hoh Peter...
IEEECIT
2006
IEEE
14 years 6 months ago
Research on a Mechanism for Assisting Service Retrieval
Through as an important part of service-oriented system architecture, service retrieval receives much attention from industry and academia and many methods have been proposed, the...
Bin Tang, Leqiu Qian, Ruzhi Xu, Yunjiao Xue, Hui T...
IEEECIT
2006
IEEE
14 years 6 months ago
A Novel Implementation of JPEG 2000 Lossless Coding Based on LZMA
Faced with drawbacks of JPEG 2000 lossless coding in network application as far as manipulation flexibility is concerned, this paper proposes a differential approach of implementa...
Zongjie Tu, Shiyong Zhang
IEEECIT
2006
IEEE
14 years 6 months ago
Towards Balancing Data Usefulness and Privacy Protection in K-Anonymisation
K-anonymisation, as an approach to protecting data privacy, has received much recent attention from the database research community. Given a single table, there can be many ways t...
Grigorios Loukides, Jianhua Shao
IEEECIT
2006
IEEE
14 years 6 months ago
An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in Wireless Sensor Networks
In this paper we propose an improved and efficient key pre-distribution scheme for wireless sensor networks. Our scheme significantly increases the storage efficiency and security...
Al-Sakib Khan Pathan, Tran Thanh Dai, Choong Seon ...
IEEECIT
2006
IEEE
14 years 6 months ago
One Update for all Moving Objects at a Timestamp
Concurrently with fast development of location aware technologies, many applications have been developing to exploit location data for serving people. However, a main challenge in...
Hoang Do Thanh Tung, Keun Ho Ryu
IEEECIT
2006
IEEE
14 years 6 months ago
Dynamic Replica Location Service Supporting Data Grid Systems
Data grid is a kind of wide-area, distributed storage system. It can provide huge storage capacity. There are millions of files in data grid, distributed on hundreds of geographi...
Qiwei Zhang, Jiangming Yang, Ning Gu, Yuwei Zong, ...