Sciweavers

1522 search results - page 190 / 305
» Practical Exception Specifications
Sort
View
SASO
2009
IEEE
15 years 8 months ago
Swarming Geographic Event Profiling, Link Analysis, and Prediction
Geographically embedded processes with hidden origins are often observable in events they generate. It is common practice in criminological forensics to reverse simple equation-ba...
Sven A. Brueckner
IEEEIAS
2009
IEEE
15 years 8 months ago
Organizational Barriers to the Implementation of Security Engineering
: The link between security engineering and systems engineering exists at the earliest stage of systems development, and, as a whole, there is sufficient evidence to suggest the di...
Bryan Stewart Cline
111
Voted
AGILEDC
2008
IEEE
15 years 8 months ago
Utilizing Digital Tabletops in Collocated Agile Planning Meetings
In agile software development, planning meetings play a pivotal role in establishing a concrete understanding of customers’ requirements. Using tools to enhance the effectivenes...
Yaser Ghanam, Xin Wang, Frank Maurer
IISWC
2008
IEEE
15 years 8 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley
95
Voted
ISCC
2008
IEEE
114views Communications» more  ISCC 2008»
15 years 8 months ago
An enhanced approach for efficient MBMS handovers in 3G networks
With MBMS, a mobile Terminal (MT) that is on the move and receive an MBMS service may have to handover from a Common to a Dedicated Channel when crossing the cell’s edge. In pre...
Christophoros Christophorou, Andreas Pitsillides