Sciweavers

1647 search results - page 237 / 330
» Relationship Aspect Patterns
Sort
View
VAMOS
2007
Springer
14 years 3 months ago
Requirements Modelling and Design Notations for Software Product Lines
Although feature modelling is a frequently used approach to the task of modelling commonality and variability within product lines, there is currently no standard modelling notati...
T. John Brown, Rachel Gawley, Ivor T. A. Spence, P...
AINA
2006
IEEE
14 years 3 months ago
Peer-to-Peer Usage Analysis: a Distributed Mining Approach
With the huge number of information sources available on the Internet, Peer-to-Peer (P2P) systems offer a novel kind of system architecture providing the large-scale community wit...
Florent Masseglia, Pascal Poncelet, Maguelonne Tei...
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
14 years 3 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon
PLDI
2006
ACM
14 years 2 months ago
LOCKSMITH: context-sensitive correlation analysis for race detection
One common technique for preventing data races in multi-threaded programs is to ensure that all accesses to shared locations are consistently protected by a lock. We present a too...
Polyvios Pratikakis, Jeffrey S. Foster, Michael W....
ICDCS
2005
IEEE
14 years 2 months ago
On Flow Marking Attacks in Wireless Anonymous Communication Networks
— This paper studies the degradation of anonymity in a flow-based wireless mix network under flow marking attacks, in which an adversary embeds a recognizable pattern of marks ...
Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati,...