Sciweavers

489 search results - page 68 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
SIGMOD
2012
ACM
190views Database» more  SIGMOD 2012»
12 years 1 months ago
Sample-driven schema mapping
End-users increasingly find the need to perform light-weight, customized schema mapping. State-of-the-art tools provide powerful functions to generate schema mappings, but they u...
Li Qian, Michael J. Cafarella, H. V. Jagadish
COMPSAC
2005
IEEE
14 years 4 months ago
Searching Design Patterns in Source Code
Maintenance is a time consuming activity within software development and it requires a good understanding of the system in question. It is hard or even impossible to understand po...
Detlef Streitferdt, Christian Heller, Ilka Philipp...
CSE
2009
IEEE
14 years 5 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
ATAL
2009
Springer
14 years 5 months ago
Evolutionary testing of autonomous software agents
A system built in terms of autonomous agents may require even greater correctness assurance than one which is merely reacting to the immediate control of its users. Agents make su...
Cu D. Nguyen, Anna Perini, Paolo Tonella, Simon Mi...
ESWS
2005
Springer
14 years 4 months ago
AquaLog: An Ontology-Portable Question Answering System for the Semantic Web
As semantic markup becomes ubiquitous, it will become important to be able to ask queries and obtain answers, using natural language (NL) expressions, rather than the keyword-based...
Vanessa Lopez, Michele Pasin, Enrico Motta