Sciweavers

1620 search results - page 212 / 324
» Use Case Level Pointcuts
Sort
View
IMF
2007
15 years 23 days ago
Testing Forensic Hash Tools on Sparse Files
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...
CASCON
2006
118views Education» more  CASCON 2006»
15 years 22 days ago
Ensuring behavioural equivalence in test-driven porting
In this paper we present a test-driven approach to porting code from one object-oriented language to another. We derive an order for the porting of the code, along with a testing ...
Mark Hennessy, James F. Power
ECIS
2004
15 years 22 days ago
Inter-organizational collaboration and value creation in the automotive industry
In response to the difficulties experienced by the automotive industry in adopting new procurement technology this research investigates an emerging phenomenon: electronic interor...
Mickey Howard, Philip Powell, Richard T. Vidgen
IQ
1996
15 years 19 days ago
A TQM Approach to the Improvement of Information Quality
There is a consistent gap between users expectations regarding Information Quality (IQ) and the perceived quality of the information they are using. An explicit approach to IQ is ...
Ron Dvir, Stephen Evans
AR
2008
118views more  AR 2008»
14 years 11 months ago
Efficient Behavior Learning Based on State Value Estimation of Self and Others
The existing reinforcement learning methods have been seriously suffering from the curse of dimension problem especially when they are applied to multiagent dynamic environments. ...
Yasutake Takahashi, Kentarou Noma, Minoru Asada