Sciweavers

16790 search results - page 3342 / 3358
» A Future for Software Engineering
Sort
View
95
Voted
IEEESP
2007
98views more  IEEESP 2007»
15 years 20 days ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
110
Voted
IJISEC
2007
119views more  IJISEC 2007»
15 years 20 days ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
117
Voted
SMA
2008
ACM
149views Solid Modeling» more  SMA 2008»
15 years 20 days ago
Exact arrangements on tori and Dupin cyclides
An algorithm and implementation is presented to compute the exact arrangement induced by arbitrary algebraic surfaces on a parametrized ring Dupin cyclide. The family of Dupin cyc...
Eric Berberich, Michael Kerber
126
Voted
INTERNET
2007
113views more  INTERNET 2007»
15 years 19 days ago
REST Eye for the SOA Guy
it’s hardly Earth-shattering: abstracting your business services and separating them from your applications can yield an overall system that’s easier to build, maintain, and ex...
Steve Vinoski
TCS
2008
15 years 19 days ago
A typed lambda calculus with intersection types
Intersection types are well-known to type theorists mainly for two reasons. Firstly, they type all and only the strongly normalizable lambda terms. Secondly, the intersection type...
Viviana Bono, Betti Venneri, Lorenzo Bettini
« Prev « First page 3342 / 3358 Last » Next »