Sciweavers

10241 search results - page 1595 / 2049
» Goal-Driven Software Development
Sort
View
IIE
2006
183views more  IIE 2006»
15 years 4 months ago
Desktop Tools for Offline Plagiarism Detection in Computer Programs
Plagiarism in universities has always been a difficult problem to overcome. Various tools have been developed over the past few years to help teachers detect plagiarism in students...
Maxim Mozgovoy
IJON
2006
112views more  IJON 2006»
15 years 4 months ago
Comparison of automated parameter estimation methods for neuronal signaling networks
This work is a suitability study of the different optimization methods for automated parameter estimation (fitting) in the context of neuronal signaling networks. The Gepasi simul...
Antti Pettinen, Olli Yli-Harja, Marja-Leena Linne
JCP
2008
128views more  JCP 2008»
15 years 4 months ago
Life Cycle for Change Management in Business Processes using Semantic Technologies
In a fast changing market environment the task of reducing the downtime for change management of business processes has high importance. Ensuring that IT reflects the updated busin...
Uttam Kumar Tripathi, Knut Hinkelmann, Daniela Fel...
JCP
2008
155views more  JCP 2008»
15 years 4 months ago
Algorithm to Optimize Code Size and Energy Consumption in Real Time Embedded System
Processor is an important computing element in portable battery operated real time embedded system and it consumes most of the battery energy. Energy consumption, processor memory ...
Santosh D. Chede, Kishore D. Kulat
IPL
2006
85views more  IPL 2006»
15 years 4 months ago
A flaw in the electronic commerce protocol SET
The Secure Electronic Transaction (SET) protocol has been developed by the major credit card companies in association with some of the top software corporations to secure e-commer...
Srecko Brlek, Sardaouna Hamadou, John Mullins
« Prev « First page 1595 / 2049 Last » Next »