Sciweavers

4350 search results - page 726 / 870
» Case studies for contract-based systems
Sort
View
ICSE
2008
IEEE-ACM
14 years 9 months ago
An ontology-driven software architecture evaluation method
Software architecture evaluation has a crucial role in the life cycle of software intensive systems. In this paper we propose an approach to empower a software architecture evalua...
Aida Erfanian, Fereidoun Shams Aliee
MOBISYS
2007
ACM
14 years 8 months ago
Simplifying cyber foraging for mobile devices
Cyber foraging is the transient and opportunistic use of compute servers by mobile devices. The short market life of such devices makes rapid modification of applications for remo...
Rajesh Krishna Balan, Darren Gergle, Mahadev Satya...
WWW
2010
ACM
14 years 3 months ago
Exploring searcher interactions for distinguishing types of commercial intent
An improved understanding of the relationship between search intent, result quality, and searcher behavior is crucial for improving the effectiveness of web search. While recent p...
Qi Guo, Eugene Agichtein
CHI
2010
ACM
14 years 3 months ago
Deception and magic in collaborative interaction
We explore the ways in which interfaces can be designed to deceive users so as to create the illusion of magic. We present a study of an experimental performance in which a magici...
Joe Marshall, Steve Benford, Tony P. Pridmore
AVSS
2009
IEEE
14 years 3 months ago
Event Composition with Imperfect Information for Bus Surveillance
—Demand for bus surveillance is growing due to the increased threats of terrorist attack, vandalism and litigation. However, CCTV systems are traditionally used in forensic mode,...
Jianbing Ma, Weiru Liu, Paul Miller, Weiqi Yan