Sciweavers

416 search results - page 20 / 84
» Some new approaches for preventing software tampering
Sort
View
HCI
2007
15 years 26 days ago
Mobile Social Software for the Developing World
This paper discusses how the importance of social networks for performing everyday tasks in the developing world leads to new considerations of the utility of social networking sof...
Beth E. Kolko, Erica J. Johnson, Emma J. Rose
NPC
2010
Springer
14 years 9 months ago
Vectorization for Java
Java is one of the most popular programming languages in today’s software development, but the adoption of Java in some areas like high performance computing, gaming, and media p...
Jiutao Nie, Buqi Cheng, Shisheng Li, Ligang Wang, ...
COMPSAC
2002
IEEE
15 years 4 months ago
An Approach to Identify Duplicated Web Pages
A relevant consequence of the unceasing expansion of the Web and e-commerce is the growth of the demand of new Web sites and Web applications. The software industry is facing the ...
Giuseppe A. Di Lucca, Massimiliano Di Penta, Anna ...
AGILEDC
2006
IEEE
15 years 5 months ago
Refactoring with Contracts
Design by contract is a practical methodology for developing code together with its specification. The contract consists of class invariants and method preand postconditions. As ...
Maayan Goldstein, Yishai A. Feldman, Shmuel S. Tys...
INFORMATICALT
2002
91views more  INFORMATICALT 2002»
14 years 11 months ago
Bayesian Heuristic Approach to Scheduling
Abstract. Real life scheduling problems are solved by heuristics with parameters defined by experts, as usual. In this paper a new approach is proposed where the parameters of vari...
Jonas Mockus