Sciweavers

927 search results - page 46 / 186
» Practical Limits on Software Dependability: A Case Study
Sort
View
CHI
2010
ACM
14 years 2 months ago
Investigating user account control practices
Non-administrator user accounts and the user account control (UAC) approach of Windows Vista are two practical solutions to limit the damage of malware infection. UAC in Windows V...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
COMPSAC
2006
IEEE
14 years 1 months ago
On the Distribution of Property Violations in Formal Models: An Initial Study
Model-checking techniques are successfully used in the verification of both hardware and software systems of industrial relevance. Unfortunately, the capability of current techni...
Jimin Gao, Mats Per Erik Heimdahl, David Owen, Tim...
CORR
2002
Springer
135views Education» more  CORR 2002»
13 years 7 months ago
Minimal-Change Integrity Maintenance Using Tuple Deletions
We address the problem of minimal-change integrity maintenance in the context of integrity constraints in relational databases. We assume that integrity-restoration actions are li...
Jan Chomicki, Jerzy Marcinkowski
DEXAW
2002
IEEE
148views Database» more  DEXAW 2002»
14 years 18 days ago
A Practical Approach to Multi-Attribute Auctions
In most electronic auctions conducted over the Internet today price is still the only decision criteria for the best bid. This is true for all sorts of auctions in the electronic ...
Birgit Burmeister, Tobias Ihde, Thomas Kittsteiner...
GROUP
2010
ACM
13 years 5 months ago
Design methods as discourse on practice
In this paper, we present a view of design methods as discourse on practice. We consider how the deployment of a particular set of design methods enables and constrains not only p...
Marisa Leavitt Cohn, Susan Elliott Sim, Paul Douri...