Sciweavers

26354 search results - page 69 / 5271
» How we refactor, and how we know it
Sort
View
WETICE
1997
IEEE
14 years 1 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...
DAGM
2007
Springer
14 years 1 months ago
How to Find Interesting Locations in Video: A Spatiotemporal Interest Point Detector Learned from Human Eye Movements
Interest point detection in still images is a well-studied topic in computer vision. In the spatiotemporal domain, however, it is still unclear which features indicate useful inter...
Wolf Kienzle, Bernhard Schölkopf, Felix A. Wi...
ECTEL
2006
Springer
14 years 22 days ago
The User as Prisoner: How the Dilemma Might Dissolve
Abstract. Content objects are essential links between Knowledge Management and E-Learning systems. Therefore content authoring and sharing is an important, interdisciplinary topic ...
Andrea Kohlhase
EDO
2006
Springer
14 years 22 days ago
Ubiquitous RATs: how resource-aware run-time tests can improve ubiquitous software systems
In this paper we describe a new approach for increasing the reliability of ubiquitous software systems. This is achieved by executing tests at run-time. The individual software co...
Matthias Merdes, Rainer Malaka, Dima Suliman, Barb...
ZUM
2000
Springer
107views Formal Methods» more  ZUM 2000»
14 years 18 days ago
How to Drive a B Machine
The B-Method is a state-based formal method that describes behaviour in terms of MACHINES whose states change under OPERATIONS. The process algebra CSP is an event-based formalism ...
Helen Treharne, Steve Schneider