Sciweavers

1654 search results - page 142 / 331
» Comparing Two Software Design Process Theories
Sort
View
AGILEDC
2004
IEEE
15 years 8 months ago
Exploring Extreme Programming in Context: An Industrial Case Study
A longitudinal case study evaluating the effects of adopting the Extreme Programming (XP) methodology was performed at Sabre Airline SolutionsTM. The Sabre team was a characterist...
Lucas Layman, Laurie A. Williams, Lynn Cunningham
VTC
2010
IEEE
207views Communications» more  VTC 2010»
15 years 3 months ago
The Design and Implementation of IEEE 802.21 and Its Application on Wireless VoIP
—Supporting a multimode mobile device to seamlessly switch its connections between various wireless access networks, such as WiMAX, Wi-Fi, and LTE, is an important research issue...
Tein-Yaw Chung, Yung-Mu Chen, Pu-Chen Mao, Chen-Ku...
DSN
2004
IEEE
15 years 8 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
SCESM
2006
ACM
238views Algorithms» more  SCESM 2006»
15 years 11 months ago
Nobody's perfect: interactive synthesis from parametrized real-time scenarios
As technical systems keep growing more complex and sophisticated, designing software for the safety-critical coordination between their components becomes increasingly difficult....
Holger Giese, Stefan Henkler, Martin Hirsch, Flori...
AC
1999
Springer
15 years 9 months ago
Integrating Group Communication with Transactions for Implementing Persistent Replicated Objects
A widely used computational model for constructing fault-tolerant distributed applications employs atomic transactions for controlling operations on persistent objects. There has ...
Mark C. Little, Santosh K. Shrivastava