Sciweavers

1027 search results - page 56 / 206
» Opening Up The Enterprise
Sort
View
ICSE
2004
IEEE-ACM
15 years 12 months ago
Mining Version Histories to Guide Software Changes
We apply data mining to version histories in order to guide programmers along related changes: "Programmers who changed these functions also changed...." Given a set of e...
Andreas Zeller, Peter Weißgerber, Stephan Di...
ICSE
2007
IEEE-ACM
15 years 12 months ago
Mismar: A New Approach to Developer Documentation
Successful open source projects foster collaboration and innovation while benefiting from a faster pace of development, but are often plagued by poor developer's documentatio...
Barthélémy Dagenais, Harold Ossher
PVM
2004
Springer
15 years 5 months ago
TEG: A High-Performance, Scalable, Multi-network Point-to-Point Communications Methodology
Abstract. TEG is a new component-based methodology for point-to-point messaging. Developed as part of the Open MPI project, TEG provides a configurable fault-tolerant capability f...
Timothy S. Woodall, Richard L. Graham, Ralph H. Ca...
FSE
2001
Springer
116views Cryptology» more  FSE 2001»
15 years 4 months ago
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
The NESSIE project (New European Schemes for Signature, Integrity and Encryption) intends to put forward a portfolio containing the next generation of cryptographic primitives. The...
Bart Preneel
EATIS
2009
ACM
15 years 3 months ago
Towards dynamic trust establishment for identity federation
Federation has emerged as a key concept for identity management, as it is the basis to reduce complexity in the companies and improve user experience. However, the problem of esta...
Florina Almenárez Mendoza, Patricia Arias, ...