Sciweavers

8636 search results - page 81 / 1728
» How Developers Copy
Sort
View
WCRE
2008
IEEE
15 years 4 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou
ICNS
2006
IEEE
15 years 3 months ago
Anycast Algorithms Supporting Optical Burst Switched Grid Networks
— In this paper we consider implementing optical burst switching as a technology for building Grids with computationally intensive requirements. This architecture has been referr...
Marc De Leenheer, Farid Farahmand, Kejie Lu, Tao Z...
SIGMETRICS
2006
ACM
15 years 3 months ago
Fluid modeling of pollution proliferation in P2P networks
P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsu...
Rakesh Kumar, David D. Yao, Amitabha Bagchi, Keith...
EUROCRYPT
2005
Springer
15 years 3 months ago
Cryptanalysis of the Hash Functions MD4 and RIPEMD
MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the dedicated hash functions such as MD5, SHAx, RIPEMD, and HAVAL. In 1996, Dobbertin showed ...
Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, ...
RE
2009
Springer
15 years 2 months ago
Improving the Exchange of Requirements and Specifications between Business Partners
Increasingly complex supplier-relationships dominate product development, independent of industries and products. Mostly the primary source of risks and later problems is insuffic...
Manuel Reis Monteiro, Christof Ebert, Matthias Rec...