Sciweavers

1173 search results - page 87 / 235
» Identifying Successful Telecommuters
Sort
View
IJNSEC
2008
119views more  IJNSEC 2008»
15 years 5 months ago
Customizing Cellular Message Encryption Algorithm
This paper observes the cryptanalysis of the Telecommunications Industry Association's Cellular Message Encryption Algorithm (CMEA). The CMEA has been widely used for wireles...
Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
ISCI
2008
137views more  ISCI 2008»
15 years 5 months ago
Inference of differential equation models by genetic programming
This paper describes an evolutionary method for identifying a causal model from the observed time series data. We use a system of ordinary differential equations (ODEs) as the cau...
Hitoshi Iba
170
Voted
INFSOF
2006
159views more  INFSOF 2006»
15 years 5 months ago
Essential communication practices for Extreme Programming in a global software development team
We conducted an industrial case study of a distributed team in the USA and the Czech Republic that used Extreme Programming. Our goal was to understand how this globally-distribut...
Lucas Layman, Laurie Williams, Daniela Damian, Hyn...
JDM
2008
114views more  JDM 2008»
15 years 5 months ago
Bug Fixing Practices within Free/Libre Open Source Software Development Teams
Free/libre open source software (FLOSS, e.g., Linux or Apache) is primarily developed by distributed teams. Developers contribute from around the world and coordinate their activi...
Kevin Crowston, Barbara Scozzi
JMLR
2008
117views more  JMLR 2008»
15 years 5 months ago
Closed Sets for Labeled Data
Closed sets have been proven successful in the context of compacted data representation for association rule learning. However, their use is mainly descriptive, dealing only with ...
Gemma C. Garriga, Petra Kralj, Nada Lavrac