Sciweavers

1352 search results - page 189 / 271
» Designing Security Requirements Models Through Planning
Sort
View
DOA
2001
117views more  DOA 2001»
13 years 10 months ago
Developing Mobile Agent Organizations: A Case Study in Digital Tourism
Mobile agents are a useful paradigm for the development of complex Internet applications. However, the effective development of mobile agent applications requires suitable models ...
Franco Zambonelli, Giacomo Cabri, Letizia Leonardi
CACM
2007
164views more  CACM 2007»
13 years 9 months ago
Is abstraction the key to computing?
ACTION THE KEY TO COMPUTING? Why is it that some software engineers and computer scientists are able to produce clear, elegant designs and programs, while others cannot? Is it poss...
Jeff Kramer
CISSE
2007
Springer
14 years 3 months ago
Intuitive Interface for the Exploration of Volumetric Datasets
Conventional human-computer interfaces for the exploration of volume datasets employ the mouse as an input device. Specifying an oblique orientation for a crosssectional plane thr...
Rahul Sarkar, Chrishnika de Almeida, Noureen Syed,...
EMSOFT
2008
Springer
13 years 10 months ago
Automatically transforming and relating Uppaal models of embedded systems
Relations between models are important for effective automatic validation, for comparing implementations with specifications, and for increased understanding of embedded systems d...
Timothy Bourke, Arcot Sowmya
HICSS
2003
IEEE
165views Biometrics» more  HICSS 2003»
14 years 2 months ago
The Birth of An E-Business System Architecture: Conflicts, Compromises, and Gaps in Methods
This paper describes the system architecture development process in an international ICT company, which is building a comprehensive e-business system for its customers. The implem...
Kari Smolander