Sciweavers

2061 search results - page 229 / 413
» Authorization for Metacomputing Applications
Sort
View
JSS
2007
174views more  JSS 2007»
15 years 4 months ago
Lessons from applying the systematic literature review process within the software engineering domain
A consequence of the growing number of empirical studies in software engineering is the need to adopt systematic approaches to assessing and aggregating research outcomes in order...
Pearl Brereton, Barbara A. Kitchenham, David Budge...
143
Voted
VLC
2008
132views more  VLC 2008»
15 years 4 months ago
Enforced generative patterns for the specification of the syntax and semantics of visual languages
We present the new notion of enforced generative pattern, a structure that declares positive or negative conditions that must be satisfied by a model. Patterns are applied to tran...
Paolo Bottoni, Esther Guerra, Juan de Lara
139
Voted
COMPSEC
2004
104views more  COMPSEC 2004»
15 years 4 months ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu
CORR
2002
Springer
156views Education» more  CORR 2002»
15 years 4 months ago
MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface
Application development for distributed-computing ``Grids'' can benefit from tools that variously hide or enable application-level management of critical aspects of the ...
Nicholas T. Karonis, Brian R. Toonen, Ian T. Foste...
PRESENCE
1998
98views more  PRESENCE 1998»
15 years 4 months ago
The Virtual Venue: User-Computer Interaction in Information-Rich Virtual Environments
We present a virtual environment application that allows users to access embedded information within an immersive virtual space. Due to the richness and complexity of this environ...
Doug A. Bowman, Larry F. Hodges, Jay David Bolter