Sciweavers

1494 search results - page 251 / 299
» Less Extreme Programming
Sort
View
128
Voted
RAID
2007
Springer
15 years 8 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
111
Voted
VLDB
2007
ACM
134views Database» more  VLDB 2007»
15 years 8 months ago
Challenges and Experience in Prototyping a Multi-Modal Stream Analytic and Monitoring Application on System S
In this paper, we describe the challenges of prototyping a reference application on System S, a distributed stream processing middleware under development at IBM Research. With a ...
Kun-Lung Wu, Philip S. Yu, Bugra Gedik, Kirsten Hi...
122
Voted
IMSCCS
2006
IEEE
15 years 8 months ago
Identification of New Members of Hydrophobin Family Using Primary Structure Analysis
Background: Hydrophobins are fungal proteins that can turn into amphipathic membranes at hydrophilic/hydrophobic interfaces by self-assembly. The assemblages by Class I hydrophobi...
Kuan Yang, Youping Deng, Chaoyang Zhang, Mohamed O...
CF
2006
ACM
15 years 8 months ago
Dynamic thread assignment on heterogeneous multiprocessor architectures
In a multi-programmed computing environment, threads of execution exhibit different runtime characteristics and hardware resource requirements. Not only do the behaviors of distin...
Michela Becchi, Patrick Crowley
ISSTA
2006
ACM
15 years 8 months ago
Towards supporting the architecture design process through evaluation of design alternatives
This paper addresses issues involved when an architect explore alternative designs including non-functional requirements; in our approach, non-functional requirements are expresse...
Lihua Xu, Scott A. Hendrickson, Eric Hettwer, Hada...