1. Program Comprehension during Software Maintenance and Evolution Armeliese von Mayrhauser, A. Marie Vans Colorado State University The paper aims to provide in-depth analysis of most notable program cognition models as well detailed comparison among them. The authors also introduce Integrated Metamodel to eventually improve the process of software maintenance and evolution. It identifies 5 […]
Cosmic Journey
Aho-Corasick Algorithm for Searching Substrings Within a String
Problem Description: “Design a program to gather statistics of all strings P of length k in a string S of length n.” The problem requires to design a program that will deliver useful statistics – count numbers and positions for a set of substrings in P having length k, stored in a string S of […]
A Miracle
1:1
Square frame compositions.
Life, elsewhere.
Why people are so emotional? I was rather annoyed. First flight, Dhaka to Hong Kong by Dragonair. When the plane was leaving I was looking down on the city lights and I was thinking about coming back already. But life has opportunities we have to keep looking for, anyway, the woman beside me was going […]
Perfect Forward Secrecy – An Introduction by Scott Helme
Perfect Forward Secrecy is a feature of specific key agreement protocols that gives assurances your session keys will not be compromised even if the private key of the server is compromised. By generating a unique session key for every session a user initiates, even the compromise of a single session key will not affect any […]
- « Previous Page
- 1
- …
- 4
- 5
- 6
- 7
- 8
- …
- 13
- Next Page »