Sciweavers

983 search results - page 144 / 197
» Health Care Management
Sort
View
92
Voted
ACSAC
2000
IEEE
15 years 5 months ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson
WMRD
1992
15 years 4 months ago
A Replicated Monitoring Tool
Modeling the reliability of distributed systems requires a good understanding of the reliability of the components. Careful modeling allows highly fault-tolerant distributed appli...
Darrell D. E. Long
114
Voted
ECLIPSE
2007
ACM
15 years 4 months ago
Studying the evolution of the Eclipse Java editor
In evolutionary software development, knowing how design evolves with features can be valuable in guiding future projects. It helps answer questions like "How much upfront de...
Daqing Hou
CAISE
2006
Springer
15 years 4 months ago
Perspectives about Paradigms in Software Engineering
There is a broad use of the term "paradigm" in Software Engineering. Concepts such as structured paradigm, cascade paradigm or agent-oriented paradigm are very frequent i...
Carlos Cares, Xavier Franch, Enric Mayol
CIT
2006
Springer
15 years 4 months ago
Bridging the Gap Between Reality and Simulations: An Ethernet Case Study
Simulation is a widely used technique in networking research and a practice that has suffered loss of credibility in recent years due to doubts about its reliability. In this pape...
Punit Rathod, Srinath Perur, Raghuraman Rangarajan