Sciweavers


Publication
159views
14 years 4 months ago
Evaluating the Effectiveness of Board Game Usage to Teach GSE Dynamics
When preparing students for an industrial or academic career in software engineering, educational institutions need to address the globally distributed character of the software en...
Kevin Dullemond, Ben van Gameren, Rini van Solinge...

Publication
158views
14 years 4 months ago
How Technological Support Can Enable Advantages of Agile Software Development in a GSE Setting
Because of the distance between the dispersed development locations, Global Software Engineering (GSE) is confronted with challenges regarding communication, coordination and co...
Kevin Dullemond, Ben van Gameren, Rini van Solinge...

Publication
260views
14 years 4 months ago
Alternative Astronomical FITS Imaging
Some important information on images of radio sources, such as radio flux and the noise of the map, is not easily accessible by astronomers other than radio astronomers, unless the...
E.E. Varsaki, N.A.B. Gizani, V. Fotopoulos and A.N...
ICDCSW
2011
IEEE
14 years 4 months ago
Cross-Examination of Datacenter Workload Modeling Techniques
Datacenter workload modeling has become a necessity in recent years due to the emergence of large-scale applications and cloud data-stores, whose implementation remains largely un...
Christina Delimitrou, Christos Kozyrakis
ICDCSW
2011
IEEE
14 years 4 months ago
Finding a "Kneedle" in a Haystack: Detecting Knee Points in System Behavior
—Computer systems often reach a point at which the relative cost to increase some tunable parameter is no longer worth the corresponding performance benefit. These “knees” t...
Ville Satopaa, Jeannie R. Albrecht, David Irwin, B...
ICDCSW
2011
IEEE
14 years 4 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
ICDCSW
2011
IEEE
14 years 4 months ago
Link-Level Network Topology Generation
Abstract—Internet topology generation involves producing synthetic network topologies that imitate the characteristics of the Internet. Although the accuracy of newly developed n...
Mehmet Burak Akgun, Mehmet Hadi Gunes
ICDCS
2011
IEEE
14 years 4 months ago
Starlink: Runtime Interoperability between Heterogeneous Middleware Protocols
—Interoperability remains a challenging and growing problem within distributed systems. A range of heterogeneous network and middleware protocols which cannot interact with one a...
Yérom-David Bromberg, Paul Grace, Laurent R...
ICDCS
2011
IEEE
14 years 4 months ago
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
— In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public...
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing...
ICDCS
2011
IEEE
14 years 4 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang