Sciweavers

83 search results - page 6 / 17
» COTS-Based Systems - Twelve Lessons Learned about Maintenanc...
Sort
View
WCRE
2010
IEEE
14 years 9 months ago
Computer-Aided Extraction of Software Components
—In a software project, outsourcing the development of a particular functionality, reusing a part in another software, or handing-over a part of the code to a new team member req...
Andreas Marx, Fabian Beck, Stephan Diehl
95
Voted
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
15 years 3 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
JUCS
2010
124views more  JUCS 2010»
14 years 5 months ago
A Tool for Managing Domain Knowledge and Helping Tutors in Intelligent Tutoring Systems
: Intelligent Tutoring Systems (ITSs) constitute a popular type of intelligent educational systems. Domain Knowledge (DK) is a basic part of an ITS and usually includes information...
Panayiotis Kyriakou, Ioannis Hatzilygeroudis, John...
BIRTHDAY
2004
Springer
15 years 2 months ago
Basic LMS Architecture for Learner-Centric LearnFlows or How Reusable Learning Objects Fit into Co-Constructivist Learning Proce
The discussions about learning management systems and reusable learning objects primarily focus on technical standardization issues. Standards such as SCORM or LTSC-LOM will yield...
Wolfgang F. Finke
RE
2004
Springer
15 years 4 months ago
The Conundrum of Categorising Requirements: Managing Requirements for Learning on the Move
This paper reports on our experience of eliciting and managing requirements on a large European-based multinational project, whose purpose is to create a system to support learnin...
Debra Trusso Haley, Bashar Nuseibeh, Helen C. Shar...