Sciweavers

2663 search results - page 460 / 533
» How to Choose a Timing Model
Sort
View
ESORICS
2005
Springer
14 years 2 months ago
Enforcing Non-safety Security Policies with Program Monitors
We consider the enforcement powers of program monitors, which intercept security-sensitive actions of a target application at run time and take remedial steps whenever the target a...
Jay Ligatti, Lujo Bauer, David Walker
GW
2005
Springer
141views Biometrics» more  GW 2005»
14 years 2 months ago
From Acoustic Cues to an Expressive Agent
This work proposes a new way for providing feedback to expressivity in music performance. Starting from studies on the expressivity of music performance we developed a system in wh...
Maurizio Mancini, Roberto Bresin, Catherine Pelach...
NOSSDAV
2005
Springer
14 years 2 months ago
A formal approach to design optimized multimedia service overlay
Service overlay networks have recently attracted tremendous interests. In this paper, we propose a new integrated framework for specifying services composed of service components ...
Hirozumi Yamaguchi, Khaled El-Fakih, Akihito Hirom...
PROFES
2005
Springer
14 years 2 months ago
Framework for Integrating Usability Practices into the Software Process
Software development organizations wanting to introduce usability practices into their defined software process have to undertake laborious efforts for that purpose, since, for the...
Xavier Ferré, Natalia Juristo Juzgado, Ana ...
ACMICEC
2004
ACM
112views ECommerce» more  ACMICEC 2004»
14 years 2 months ago
Business process redesign for effective e-commerce
Many companies have found out the hard way that successful ecommerce requires more than a flashy web presence. Existing business processes must be seamlessly integrated with the n...
Monique H. Jansen-Vullers, Mariska Netjes, Hajo A....