Sciweavers

591 search results - page 73 / 119
» Embracing policy engineering
Sort
View
135
Voted
EDBTW
2010
Springer
15 years 10 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
132
Voted
AMAST
2004
Springer
15 years 9 months ago
A Generic Software Safety Document Generator
Abstract. Formal certification is based on the idea that a mathematical proof of some property of a piece of software can be regarded as a certificate of correctness which, in pr...
Ewen Denney, Ram Prasad Venkatesan
123
Voted
UIST
1997
ACM
15 years 7 months ago
Designing and Implementing Asynchronous Collaborative Applications with Bayou
Asynchronous collaboration is characterized by the degree of independence collaborators have from one another. In particular, collaborators working asynchronously typically have l...
W. Keith Edwards, Elizabeth D. Mynatt, Karin Peter...
147
Voted
INFOSCALE
2007
ACM
15 years 5 months ago
Load-balancing and caching for collection selection architectures
— To address the rapid growth of the Internet, modern Web search engines have to adopt distributed organizations, where the collection of indexed documents is partitioned among s...
Diego Puppin, Fabrizio Silvestri, Raffaele Perego,...
124
Voted
RE
2006
Springer
15 years 3 months ago
Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations
In the United States, federal and state regulations prescribe stakeholder rights and obligations that must be satisfied by the requirements for software systems. These regulations ...
Travis D. Breaux, Matthew W. Vail, Annie I. Ant&oa...