Sciweavers

5843 search results - page 1030 / 1169
» Software Security in Practice
Sort
View
HICSS
2007
IEEE
139views Biometrics» more  HICSS 2007»
15 years 10 months ago
Experiences of Using Pair Programming in an Agile Project
The interest in pair programming (PP) has increased recently, e.g. by the popularization of agile software development. However, many practicalities of PP are poorly understood. W...
Jari Vanhanen, Harri Korpi
HPDC
2007
IEEE
15 years 10 months ago
Scaling multiplayer online games using proxy-server replication: a case study of Quake 2
Massively Multiplayer Online Games (MMOGs) are an increasingly popular class of real-time interactive distributed applications that require scalable architectures and parallelizat...
Jens Müller 0004, Sergei Gorlatch, Tobias Sch...
IAT
2007
IEEE
15 years 10 months ago
Redefining Social Network Services: A Solution to Personal Information and Knowledge Management
Instead of aiming at the augmentation of human communication abilities as other social software does, social network services (SNS) provide better chances for people to enhance th...
Tingting Jiang, Daqing He
ICAC
2007
IEEE
15 years 10 months ago
SLA Decomposition: Translating Service Level Objectives to System Level Thresholds
In today’s complex and highly dynamic computing environments, systems/services have to be constantly adjusted to meet Service Level Agreements (SLAs) and to improve resource uti...
Yuan Chen, Subu Iyer, Xue Liu, Dejan S. Milojicic,...
ICCCN
2007
IEEE
15 years 10 months ago
Reduce IP Address Fragmentation through Allocation
— The scalability of Internet addressing and routing has been a serious issue and becomes a more urgent problem today because of driving factors like IPv6. A radical impacting el...
Mei Wang, Larry Dunn, Wei Mao, Tao Chen
« Prev « First page 1030 / 1169 Last » Next »