Sciweavers

2111 search results - page 280 / 423
» How to Program Pervasive Systems
Sort
View
UM
2009
Springer
15 years 9 months ago
Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure
This paper describes the evaluation of a Scrutable User Modelling Infrastructure. SUMI is intended to form a service to allow users to share their user models from social e-network...
Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropa...
SCAM
2007
IEEE
15 years 8 months ago
Quality Assessment for Embedded SQL
—The access of information systems to underlying relational databases is commonly programmed using embedded SQL queries. Such embedded queries may take the form of string literal...
Huib van den Brink, Rob van der Leek, Joost Visser
131
Voted
WCRE
2007
IEEE
15 years 8 months ago
Do Code and Comments Co-Evolve? On the Relation between Source Code and Comment Changes
Comments are valuable especially for program understanding and maintenance, but do developers comment their code? To which extent do they add comments or adapt them when they evol...
Beat Fluri, Michael Würsch, Harald Gall
129
Voted
ICSOC
2004
Springer
15 years 8 months ago
Smart monitors for composed services
Service-based approaches are widely used to integrate heterogenous systems. Web services allow for the definition of highly dynamic systems where components (services) can be dis...
Luciano Baresi, Carlo Ghezzi, Sam Guinea
ICALP
2010
Springer
15 years 7 months ago
Automata for Coalgebras: An Approach Using Predicate Liftings
Universal Coalgebra provides the notion of a coalgebra as the natural mathematical generalization of state-based evolving systems such as (infinite) words, trees, and transition s...
Gaëlle Fontaine, Raul Andres Leal, Yde Venema