Sciweavers

424 search results - page 56 / 85
» Requirements Prioritization Challenges in Practice
Sort
View
SIGECOM
2008
ACM
144views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Incentives for expressing opinions in online polls
Prediction markets efficiently extract and aggregate the private information held by individuals about events and facts that can be publicly verified. However, facts such as the e...
Radu Jurca, Boi Faltings
TVCG
2008
127views more  TVCG 2008»
13 years 7 months ago
EMDialog: Bringing Information Visualization into the Museum
Digital interactive information displays are becoming more common in public spaces such as museums, galleries, and libraries. However, the public nature of these locations requires...
Uta Hinrichs, Holly Schmidt, M. Sheelagh T. Carpen...
JSS
2007
120views more  JSS 2007»
13 years 7 months ago
The design and evaluation of path matching schemes on compressed control flow traces
A control flow trace captures the complete sequence of dynamically executed basic blocks and function calls. It is usually of very large size and therefore commonly stored in com...
Yongjing Lin, Youtao Zhang, Rajiv Gupta
DSE
1998
80views more  DSE 1998»
13 years 7 months ago
The Voltan application programming environment for fail-silent processes
The Voltan software library for building distributed applications provides the support for (i) a processpair to act as single Voltan self-checking ‘fail-silent’ process; and (...
Dave Black, C. Low, Santosh K. Shrivastava
TRUSTBUS
2010
Springer
13 years 6 months ago
Privacy Policy Referencing
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Audun Jøsang, Lothar Fritsch, Tobias Mahler