Sciweavers

32 search results - page 2 / 7
» acsc 2006
Sort
View
ACSC
2006
IEEE
13 years 11 months ago
Trust network analysis with subjective logic
Trust networks consist of transitive trust relationships between people, organisations and software agents connected through a medium for communication and interaction. By formali...
Audun Jøsang, Ross Hayward, Simon Pope
ACSC
2006
IEEE
13 years 11 months ago
Plagiarism detection across programming languages
Plagiarism is a widespread problem in assessment tasks; in computing courses, students often plagiarise source code. For all but the smallest classes, manual detection of such pla...
Christian Arwin, Seyed M. M. Tahaghoghi
ACSC
2006
IEEE
13 years 11 months ago
Supporting software reuse by the individual programmer
Despite its long history and its benefits, software reuse has yet to become a common practise among software programmers. While there is much ongoing research, it focuses on larg...
Min-Sheng Hsieh, Ewan D. Tempero
ACSC
2006
IEEE
13 years 11 months ago
Identifying refactoring opportunities by identifying dependency cycles
The purpose of refactoring is to improve the quality of a software system by changing its internal design so that it is easier to understand or modify, or less prone to errors and...
Hayden Melton, Ewan D. Tempero
ACSC
2006
IEEE
13 years 11 months ago
On pedagogically sound examples in public-key cryptography
Pencil-and-paper exercises in public-key cryptography are important in learning the subject. It is desirable that a student doing such an exercise does not get the right answer by...
Suan Khai Chong, Graham Farr, Laura Frost, Simon H...