Now showing items 1-9 of 9
Critical Theory as an Approach to the Ethics of Information Security
An Extended Stable Marriage Problem Algorithm for Clone Detection
(International Journal of Software Engineering & Applications (IJSEA), 2014)
Code cloning negatively affects industrial software and threatens intellectual property. This paper presents a novel approach to detecting cloned software by using a bijective matching technique. The proposed approach ...
Mobile Grid System: Policy and Privacy
(LAP LAMBERT Academic Publishing, 2014-03-03)
Mobile Grid Services have given the ability to move jobs, data and application software from nodes to nodes during jobs' execution in the grid environment. They have also solved some of the lack in finding suitable resources ...
SMP-Based Approach for Intelligent Service Interaction
((IJACSA), Special Issue on Extended Papers from Science and Information Conference, 2014)
Formality, Agility, Security and Evolution in Software Development
Combining formal and agile techniques in software development has the potential to minimize change-related problems.
SMP-Based clone detection
(Second International Conference on Software Engineering (SE-2014), 2014)
IT Application Readiness using Balanced Score Card Measurement
(The WEI International Academic Conference Proceedings, 2014-01-14)
Information Technology is one of the most important things used in our daily lives where most organizations are dependent on the system to facilitate the tasks of work, Balanced Scorecard is one of the most successful means ...
SMP-Based service matching
(Science and Information Conference (SAI’14), 2014)