Sciweavers

5843 search results - page 1025 / 1169
» Software Security in Practice
Sort
View
CHI
2010
ACM
15 years 11 months ago
Factors impeding Wiki use in the enterprise: a case study
Our research explored factors that impacted the use of wikis as a tool to support the dissemination of knowledge within an enterprise. Although we primarily talked to a population...
Lester J. Holtzblatt, Laurie E. Damianos, Daniel W...
CC
2010
Springer
172views System Software» more  CC 2010»
15 years 11 months ago
Verifying Local Transformations on Relaxed Memory Models
The problem of locally transforming or translating programs without altering their semantics is central to the construction of correct compilers. For concurrent shared-memory progr...
Sebastian Burckhardt, Madanlal Musuvathi, Vasu Sin...
WEA
2010
Springer
545views Algorithms» more  WEA 2010»
15 years 11 months ago
Experiments on Union-Find Algorithms for the Disjoint-Set Data Structure
Abstract. The disjoint-set data structure is used to maintain a collection of non-overlapping sets of elements from a finite universe. Algorithms that operate on this data structu...
Md. Mostofa Ali Patwary, Jean R. S. Blair, Fredrik...
AINA
2009
IEEE
15 years 11 months ago
Business Compliance Governance in Service-Oriented Architectures
Abstract — Governing business compliance with regulations, laws, best practices, contracts, and the like is not an easy task, and so far there are only limited software products ...
Florian Daniel, Fabio Casati, Vincenzo D'Andrea, E...
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
15 years 11 months ago
Multiple Social Networks Analysis of FLOSS Projects using Sargas
Due to their characteristics and claimed advantages, several researchers have been investigating free and open-source projects. Different aspects are being studied: for instance, ...
Samuel Felix de Sousa Jr., Marco Antonio Balieiro,...
« Prev « First page 1025 / 1169 Last » Next »