Sciweavers

786 search results - page 4 / 158
» A Software System for Secure Computer Aided Exams
Sort
View
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 2 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
CMMR
2004
Springer
124views Music» more  CMMR 2004»
14 years 27 days ago
Collaborative Computer-Aided Parameter Exploration for Music and Animation
Although many artists have worked to create associations between music and animation, this has traditionally be done by developing one to suit the pre-existing other, as in visuali...
Daryl H. Hepting, David Gerhard
PDCAT
2007
Springer
14 years 1 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling
CC
2012
Springer
243views System Software» more  CC 2012»
12 years 3 months ago
Sambamba: A Runtime System for Online Adaptive Parallelization
Abstract. How can we exploit a microprocessor as efficiently as possible? The “classic” approach is static optimization at compile-time, optimizing a program for all possible u...
Kevin Streit, Clemens Hammacher, Andreas Zeller, S...
SIGSOFT
2010
ACM
13 years 5 months ago
Multiplicity computing: a vision of software engineering for next-generation computing platform applications
New technologies have recently emerged to challenge the very nature of computing: multicore processors, virtualized operating systems and networks, and data-center clouds. One can...
Cristian Cadar, Peter Pietzuch, Alexander L. Wolf