Sciweavers

586 search results - page 66 / 118
» Model-Driven User Requirements Specification using SysML
Sort
View
135
Voted
CIKM
2008
Springer
15 years 4 months ago
SQL extension for exploring multiple tables
The standard SQL assumes that the users are aware of all tables and their schemas to write queries. This assumption may be valid when the users deal with a relatively small number...
Sung Jin Kim, Junghoo John Cho
SIGCOMM
2010
ACM
15 years 2 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
131
Voted
SAC
2006
ACM
15 years 8 months ago
Methods and guidelines for the design and development of domestic ubiquitous computing applications
Bringing ubiquitous computing applications to home environments is a great challenge. In our research we investigate how applications can be conceived, designed, and implemented t...
Albrecht Schmidt, Lucia Terrenghi
112
Voted
CHI
2006
ACM
16 years 3 months ago
The design of an interactive and dynamic representation of the firm
Interpretation and audit of financial information is a significant undertaking that must rest on a fuller understanding of the firm and its operations. A pictorial representation ...
Lin Zhao, Julia Grant, Fred L. Collopy
121
Voted
GIS
1999
ACM
15 years 7 months ago
Spatial Data Integrity Constraints in Object Oriented Geographic Data Modeling
An important activity in the design of a particular database application consists in identifying the integrity constraints that must hold on the database, and that are used to det...
Karla A. V. Borges, Alberto H. F. Laender, Clodove...