Sciweavers

3057 search results - page 310 / 612
» Complexity management
Sort
View
ACMMSP
2005
ACM
99views Hardware» more  ACMMSP 2005»
15 years 10 months ago
Gated memory control for memory monitoring, leak detection and garbage collection
ct In the past, program monitoring often operates at the code level, performing checks at function and loop boundaries. Recent research shows that profiling analysis can identify ...
Chen Ding, Chengliang Zhang, Xipeng Shen, Mitsunor...
SIGCSE
2005
ACM
134views Education» more  SIGCSE 2005»
15 years 10 months ago
Enhancing team knowledge: instruction vs. experience
Information technology projects are growing in complexity and require teams to solve problems and develop solutions. With current undergraduate, computer science and information s...
Debra L. Smarkusky, Richard F. Dempsey, Joan J. Lu...
IFIP
2005
Springer
15 years 10 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
145
Voted
CSCW
2004
ACM
15 years 10 months ago
Return on investment and organizational adoption
This paper considers the complexity of measuring the return on investment for technology adoption. A brief case study of technology adoption in a large design and construction fir...
Jonathan Grudin
DOLAP
2004
ACM
15 years 10 months ago
An analysis of additivity in OLAP systems
Accurate summary data is of paramount concern in data warehouse systems; however, there have been few attempts to completely characterize the ability to summarize measures. The su...
John Horner, Il-Yeol Song, Peter P. Chen