Sciweavers

1769 search results - page 314 / 354
» An implementation of argument based discussion
Sort
View
ICSE
2010
IEEE-ACM
15 years 4 months ago
An analysis of the variability in forty preprocessor-based software product lines
Over 30 years ago, the preprocessor cpp was developed to extend the programming language C by lightweight metaprogramming capabilities. Despite its error-proneness and low ion lev...
Jörg Liebig, Sven Apel, Christian Lengauer, C...
AGENTS
2001
Springer
15 years 4 months ago
Using rat navigation models to learn orientation from visual input on a mobile robot
Rodents possess extraordinary navigation abilities that are far in excess of what current state-of-the-art robot agents are capable of. This paper describes research that is part ...
Brett Browning
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
15 years 3 months ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
SCM
1998
15 years 1 months ago
PRCS: The Project Revision Control System
PRCS is an attempt to provide a version-control system for collections of les with a simple operational model, a clean user interface, and high performance. PRCS is characterized b...
Josh MacDonald, Paul N. Hilfinger, Luigi Semenzato
SACMAT
2011
ACM
14 years 2 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...