Sciweavers

2835 search results - page 514 / 567
» Imperfect Requirements in Software Development
Sort
View
IDTRUST
2009
ACM
14 years 4 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
CODES
2009
IEEE
14 years 4 months ago
A standby-sparing technique with low energy-overhead for fault-tolerant hard real-time systems
Time redundancy (rollback-recovery) and hardware redundancy are commonly used in real-time systems to achieve fault tolerance. From an energy consumption point of view, time redun...
Alireza Ejlali, Bashir M. Al-Hashimi, Petru Eles
COMPSAC
2009
IEEE
14 years 4 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
ICSEA
2009
IEEE
14 years 4 months ago
Ontology Driven E-Government
: This paper presents an approach to model ontologies for the e-Government domain as a basis for an integrated e-Government environment. Over the last couple of years the applicati...
Peter Salhofer, Bernd Stadlhofer, Gerald Tretter
IEAAIE
2009
Springer
14 years 4 months ago
An Agent Model of Temporal Dynamics in Relapse and Recurrence in Depression
Abstract Unipolar depression is a mental disorder characterized by a persistent low mood and loss of awareness or contentment in usual activities [1]. Despite the modern era of pha...
Azizi Ab Aziz, Michel C. A. Klein, Jan Treur