Sciweavers

2234 search results - page 406 / 447
» Protocol Implementation Using Integrated Layer Processing
Sort
View
EOR
2008
116views more  EOR 2008»
14 years 11 months ago
A hybrid neuro-fuzzy analytical approach to mode choice of global logistics management
This paper presents a hybrid neuro-fuzzy methodology to identify appropriate global logistics (GL) operational modes used for global supply chain management. The proposed methodol...
Jiuh-Biing Sheu
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
15 years 3 months ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
FLAIRS
2008
15 years 1 months ago
Towards Verification of Storyboards
Storyboards are commonly known as rows of pictures, which exemplarily sketch scenes in performing arts. The rows specify the sequence of scenes. The scenes themselves are illustra...
Rainer Knauf, Horst Duesel
JISBD
2001
15 years 19 days ago
Conceptual Modeling of Device-Independent Web Applications
Existing tools intended to build and deploy engaging complex Web sites (including functionality) have shown to be inadequate to face the software production process in an unified a...
Jaime Gómez, Cristina Cachero
70
Voted
ICSE
2008
IEEE-ACM
16 years 2 days ago
Answering conceptual queries with Ferret
Programmers seek to answer questions as they investigate the functioning of a software system, such as "which execution path is being taken in this case?" Programmers at...
Brian de Alwis, Gail C. Murphy