Sciweavers

101 search results - page 20 / 21
» You Can't Take It with You
Sort
View
AADEBUG
2005
Springer
13 years 11 months ago
Automated bug isolation via program chipping
This paper introduces program chipping, a simple yet effective technique to isolate bugs. This technique automatically removes or chips away parts of a program so that the part t...
Chad D. Sterling, Ronald A. Olsson
MADNES
2005
Springer
13 years 11 months ago
Panel: Authentication in Constrained Environments
Abstract. This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-wri...
Mike Burmester, Virgil D. Gligor, Evangelos Kranak...
SCAM
2003
IEEE
13 years 11 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
CLOUDCOM
2010
Springer
13 years 2 months ago
Power of Clouds in Your Pocket: An Efficient Approach for Cloud Mobile Hybrid Application Development
The advancements in computing have resulted in a boom of cheap, ubiquitous, connected mobile devices as well as seemingly unlimited, utility style, pay as you go computing resourc...
Ashwin Manjunatha, Ajith Ranabahu, Amit P. Sheth, ...
C5
2003
IEEE
13 years 11 months ago
SuperSwiki - Bringing collaboration to the class room
SuperSwiki is a not yet well defined term. Its origins go back to Ward Cunningham's Wiki and its Squeak variant, the Swiki. It provides a place to share and edit web pages, f...
Michael Rüger