Sciweavers

1145 search results - page 73 / 229
» Using dependency models to manage complex software architect...
Sort
View
MSWIM
2006
ACM
15 years 3 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
ASWEC
2000
IEEE
15 years 2 months ago
Software Evolution in Componentware-A Practical Approach
Industrial software projects are not based on a top-down development process relying on refinement but use a more iterative and incremental approach with respect to changing requ...
Andreas Rausch
ISSRE
2007
IEEE
14 years 11 months ago
Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software
This paper describes a study performed in an industrial setting that attempts to build predictive models to identify parts of a Java system with a high probability of fault. The s...
Erik Arisholm, Lionel C. Briand, Magnus Fuglerud
BIRTHDAY
2004
Springer
15 years 1 months ago
Basic LMS Architecture for Learner-Centric LearnFlows or How Reusable Learning Objects Fit into Co-Constructivist Learning Proce
The discussions about learning management systems and reusable learning objects primarily focus on technical standardization issues. Standards such as SCORM or LTSC-LOM will yield...
Wolfgang F. Finke
HPDC
2008
IEEE
15 years 4 months ago
Harmony: an execution model and runtime for heterogeneous many core systems
The emergence of heterogeneous many core architectures presents a unique opportunity for delivering order of magnitude performance increases to high performance applications by ma...
Gregory F. Diamos, Sudhakar Yalamanchili