Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,059 papers from all fields of science
Search
Sign In
Create Free Account
Feature complete
A feature complete version of a piece of software has all of its planned or primary features implemented but is not yet final due to bugs…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Flexive
Freeze (software engineering)
Opera (web browser)
Software release life cycle
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Implementation and Evaluation of a Component-Based framework for Internet Applications
M. Wallis
,
F. Henskens
,
Michael Hannaford
,
David J. Paul
2017
Corpus ID: 114016601
In previous publications we have introduced the concept of using a component-based software engineering paradigm to build…
Expand
Review
2013
Review
2013
TOWARDS SECURE NETWORK COMMUNICATIONS WITH CLIENTS HAVING CRYPTOGRAPHICALLY ATTESTABLE INTEGRITY
Dan H. Lutas
,
Sándor Lukács
,
Raul Toşa
,
Andrei V. Lutas
2013
Corpus ID: 55323455
In a client-server communication, the server side must trust the client before releases confidential data or accepts commands…
Expand
2013
2013
SDN-based Service Orchestration of OpenFlow and GMPLS flexi-grid networks with a stateful hierarchical PCE
R. Casellas
,
R. Muñoz
,
+7 authors
J. Fernandez-Palacios
2013
Corpus ID: 15570935
R. Casellas(1), R. Muñoz(1), R. Martínez(1), R. Vilalta(1), L. Liu(2), T. Tsuritani(3), I. Morita(3), V. López(4), O. González de…
Expand
2012
2012
Implementing a Type Debugger for Scala
Hubert Plociniczak
,
Martin Odersky
2012
Corpus ID: 11012011
Statically-typed languages offer type systems that are less and less comprehensible for programmers as the language grows in…
Expand
2012
2012
Flexible and Robust Key Rollover in DNSSEC
Yuri Schaeffer
,
B. Overeinder
,
M. Mekking
,
M. Benno
2012
Corpus ID: 16526252
DNSSEC security extensions make use of a publicprivate key pair to sign and validate origin and integrity of DNS data. The…
Expand
2012
2012
Brain Imaging for Diagnosis of Schizophrenia: Challenges, Successes and a Research Road Map
Jack O. Shelton
,
H. Arabnia
Ninth International Conference on Information…
2012
Corpus ID: 17908827
Valid diagnosis of Schizophrenia continues to be a difficult task. Diagnosis tools based on new developments in brain imaging are…
Expand
2011
2011
Open source Business Intelligence: an alternative to proprietary tools
Jorge Bernardino
,
Pedro Ribeiro
International Journal of Electronic Business
2011
Corpus ID: 2329135
Organisations are looking to increase revenue and improve profitability by improving efficiency and effectiveness in their…
Expand
2007
2007
Conference Organizers Proceedings Formatting Team Linux-vserver Resource Efficient Os-level Virtualization
Ontario Ottawa
,
Canada
,
+16 authors
M. Fiuczynski
2007
Corpus ID: 14249054
Linux-VServer is a lightweight virtualization system used to create many independent containers under a common Linux kernel. To…
Expand
2006
2006
Analysis Techniques for Service Models
W. Reisig
,
Dirk Fahland
,
+5 authors
Kathrin Kaschner
Leveraging Applications of Formal Methods
2006
Corpus ID: 14516104
The paradigm of Service-Oriented Computing (SOC) provides a framework for interorganizational business processes and for the…
Expand
2000
2000
Proxy Tk: a java applet user interface toolkit for Tcl
M. Roseman
2000
Corpus ID: 15121256
Proxy Tk allows a Tcl program to provide a highly interactive web-browser user interface, without requiring the end user to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE