Sciweavers

1685 search results - page 268 / 337
» Commonality and Variability in Software Engineering
Sort
View
WCRE
2005
IEEE
15 years 8 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
EMSOFT
2003
Springer
15 years 7 months ago
Event Correlation: Language and Semantics
Abstract. Event correlation is a service provided by middleware platforms that allows components in a publish/subscribe architecture to subscribe to patterns of events rather than ...
César Sánchez, Sriram Sankaranarayan...
REALWSN
2010
14 years 9 months ago
Visibility Levels: Managing the Tradeoff between Visibility and Resource Consumption
Pre-deployment tests of sensor networks in indoor testbeds can only deliver a very approximate view of the correctness and performance of a deployed sensor network and it is theref...
Junyan Ma, Kay Römer
130
Voted
CHI
2011
ACM
14 years 6 months ago
Characterizing the usability of interactive applications through query log analysis
People routinely rely on Internet search engines to support their use of interactive systems: they issue queries to learn how to accomplish tasks, troubleshoot problems, and other...
Adam Fourney, Richard Mann, Michael Terry
127
Voted
ATAL
2011
Springer
14 years 2 months ago
Trust as dependence: a logical approach
We propose that the trust an agent places in another agent declaratively captures an architectural connector between the two agents. We formulate trust as a generic modality expre...
Munindar P. Singh