Sciweavers

1606 search results - page 95 / 322
» Methodological Approach for Developing a KMS: A Case Study
Sort
View
ITCC
2005
IEEE
15 years 10 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
WETICE
2003
IEEE
15 years 9 months ago
Developing Adaptive and Context-aware Applications in Dynamic Networks
Suitable programming models and associated supporting infrastructures are required to deal with large software systems dived in complex and dynamic network environments. Here, wit...
Marco Mamei, Franco Zambonelli, Letizia Leonardi
CHI
2008
ACM
16 years 4 months ago
Grounded evaluation of information visualizations
We introduce grounded evaluation as a process that attempts to ensure that the evaluation of an information visualization tool is situated within the context of its intended use. ...
Petra Isenberg, Torre Zuk, Christopher Collins, M....
ICCS
2004
Springer
15 years 10 months ago
Computational Engineering and Science Program at the University of Utah
We summarize the Computational Engineering and Science program at the University of Utah. Program requirements as well as related research areas are outlined. To obtain the MS degr...
Carleton DeTar, Aaron L. Fogelson, Christopher R. ...
ACTAC
2002
75views more  ACTAC 2002»
15 years 4 months ago
Framework for Studying Substitution
This paper describes a framework for handling bound variable renaming and substitution mathematically rigorously with the aim at the same time to stay as close as possible to huma...
Härmel Nestra