Sciweavers

247 search results - page 25 / 50
» Information hiding for trusted system design
Sort
View
SERP
2004
13 years 9 months ago
Keeping Secrets within a Family: Rediscovering Parnas
David Parnas wrote several papers in the 1970's and 1980's that are now considered classics. The concepts he advocated such as information hiding and bstract interfaces ...
H. Conrad Cunningham, Cuihua Zhang, Yi Liu
CHI
2008
ACM
13 years 8 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs
PTS
2007
112views Hardware» more  PTS 2007»
13 years 9 months ago
Symbolic Model Based Testing for Component Oriented Systems
In a component oriented approach, components are designed, developed and validated in order to be widely used. However one cannot always foresee which specific uses will be made o...
Alain Faivre, Christophe Gaston, Pascale Le Gall
NDQA
2003
119views Education» more  NDQA 2003»
13 years 9 months ago
Inference Web: Portable and Sharable Explanations for Question Answering
The World Wide Web lacks support for explaining information provenance. When web applications return results, many users do not know what information sources were used, when they ...
Deborah L. McGuinness, Paulo Pinheiro da Silva
HUC
1999
Springer
13 years 11 months ago
The Role of Connectivity in Supporting Context-Sensitive Applications
This paper considers the role of network connectivity in supporting context-sensitive applications. A range of context-sensitive applications are analysed with respect to connectiv...
Keith Cheverst, Nigel Davies, Keith Mitchell, Adri...