Sciweavers

729 search results - page 119 / 146
» From personal to shared annotations
Sort
View
151
Voted
SIGSOFT
2007
ACM
16 years 4 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska
137
Voted
SIGCSE
2009
ACM
143views Education» more  SIGCSE 2009»
15 years 10 months ago
Thinking about computational thinking
Jeannette Wing’s call for teaching Computational Thinking (CT) as a formative skill on par with reading, writing, and arithmetic places computer science in the category of basic...
James J. Lu, George H. L. Fletcher
141
Voted
EMSOFT
2005
Springer
15 years 9 months ago
High performance annotation-aware JVM for Java cards
Early applications of smart cards have focused in the area of personal security. Recently, there has been an increasing demand for networked, multi-application cards. In this new ...
Ana Azevedo, Arun Kejariwal, Alexander V. Veidenba...
140
Voted
SIGADA
2004
Springer
15 years 8 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
168
Voted
LWA
2004
15 years 4 months ago
An Assessment Framework for eLearning in the Semantic Web
In this paper we present a flexible assessment framework for eLearning based on semantic web technologies. The assessment techniques are formalized as reasoning rules. These rules...
Lilia Cheniti-Belcadhi, Nicola Henze, Rafik Braham