Sciweavers

26354 search results - page 5066 / 5271
» How we refactor, and how we know it
Sort
View
KBSE
2007
IEEE
15 years 8 months ago
Towards supporting awareness of indirect conflicts across software configuration management workspaces
Workspace awareness techniques have been proposed to enhance the effectiveness of software configuration management systems in coordinating parallel work. These techniques share i...
Anita Sarma, Gerald Bortis, André van der H...
WECWIS
2007
IEEE
172views ECommerce» more  WECWIS 2007»
15 years 8 months ago
An Analysis Tool for Execution of BPEL Services
Business Process Execution Language (BPEL) is an XML-based language for specifying services. There have been numerous recent research and development efforts in both statically an...
Ariane Gravel, Xiang Fu, Jianwen Su
MMM
2007
Springer
212views Multimedia» more  MMM 2007»
15 years 8 months ago
MetaXa - Context- and Content-Driven Metadata Enhancement for Personal Photo Books
Making a photo book as a special gift to your beloved can be very time-consuming. One has to carefully select and arrange the pictures nicely over the pages of a previously bought ...
Susanne Boll, Philipp Sandhaus, Ansgar Scherp, Sab...
CCS
2007
ACM
15 years 8 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
CHES
2007
Springer
327views Cryptology» more  CHES 2007»
15 years 8 months ago
On the Power of Bitslice Implementation on Intel Core2 Processor
Abstract. This paper discusses the state-of-the-art fast software implementation of block ciphers on Intel’s new microprocessor Core2, particularly concentrating on “bitslice i...
Mitsuru Matsui, Junko Nakajima
« Prev « First page 5066 / 5271 Last » Next »