|
ADAPTING HASH TABLE DESIGN TO REAL-LIFE DATASETS
Sándor Juhász , Ákos Dudás
|
|
ADAPTED QUALITY RESOURCE SELECTION USING THE GRID REPUTATION-POLICY TRUST MANAGEMENT SERVICE
Yonatan Zetuny , Gabor Terstyanszky , Stephen Winter , Peter Kacsuk
|
|
AUTOMATIC SUMMARIZATION OF NEWS USING WORDNET CONCEPT GRAPHS
Laura Plaza , Alberto Díaz , Pablo Gervás
|
|
MODELLING PERFORMANCE IMPACT OF CACHES ON HASH TABLE PERFORMANCE
Sándor Kolumbán , Sándor Juhász , Ákos Dudás
|
|
INTRODUCING DISCIPLINE TO XP: APPLYING PRINCE2 ON XP PROJECTS
Zaidoun Alzoabi , Mouhib Alnoukari , Asim El Sheikh , Faek Diko
|
|
UML: HOW TO MODEL USER INTERFACES AN EXPLORATORY STUDY
Martin Svensson , Adam Ydenius , Linn Gustavsson Christiernin , Stefan Christiernin
|
|
THE DYNAMICS OF RFC3168 ECN: AN EXPERIMENTAL INVESTIGATION
Terry Koziniec , Michael Dixon
|
|
SIMPLIFIED SECURITY METHODOLOGY AND GUIDE FOR SECURE S/W DEVELOPMENT
Ho Seong Kim , Jae Hong Han , Wan S. Yi , Yoo Jae. Won , Bongnam Noh
|
|
BUILDING A COLLABORATORY IN AN ENGINEERING R&D ORGANIZATION
Zita P. Correia , Catarina Egreja , Maria Joaquina Barrulas , Rui Gil , Diogo R. Ferreira , Luís Arriaga Da Cunha
|