Sciweavers

1130 search results - page 183 / 226
» Developing Trust In Virtual Software Development Teams
Sort
View
129
Voted
PPSC
1993
15 years 4 months ago
Tools for Heterogeneous Network Computing
Wide area computer networks have become a basic part of today's computing infrastructure. These networks connect a variety of machines, presenting an enormous computing resou...
Adam Beguelin, Jack Dongarra, Al Geist, Robert Man...
JSCIC
2000
187views more  JSCIC 2000»
15 years 3 months ago
A Boundary Condition Capturing Method for Multiphase Incompressible Flow
In [6], the Ghost Fluid Method (GFM) was developed to capture the boundary conditions at a contact discontinuity in the inviscid compressible Euler equations. In [11], related tec...
Myungjoo Kang, Ronald Fedkiw, Xu-Dong Liu
110
Voted
WWW
2008
ACM
16 years 4 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
126
Voted
ATAL
2010
Springer
15 years 4 months ago
DipGame: a testbed for multiagent systems
There is a chronic lack of shared application domains to test the research models and agent architectures on areas like negotiation, argumentation, trust and reputation. In this d...
Angela Fabregues, David Navarro, Alejandro Serrano...
159
Voted
ICFP
2012
ACM
13 years 5 months ago
Proof-producing synthesis of ML from higher-order logic
The higher-order logic found in proof assistants such as Coq and various HOL systems provides a convenient setting for the development and verification of pure functional program...
Magnus O. Myreen, Scott Owens