Sciweavers

184 search results - page 27 / 37
» Software Requirements Negotiation: Some Lessons Learned
Sort
View
IH
2007
Springer
14 years 1 months ago
A Graph Game Model for Software Tamper Protection
We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...
CHI
2003
ACM
14 years 8 months ago
The kinedit system: affective messages using dynamic texts
Kinetic (dynamic) typography has demonstrated the ability to add significant emotive content and appeal to expressive text, allowing some of the qualities normally found in film a...
Jodi Forlizzi, Johnny C. Lee, Scott E. Hudson
EMNETS
2007
13 years 11 months ago
PermaSense: investigating permafrost with a WSN in the Swiss Alps
Currently, there is a lack of stand-alone geo-monitoring systems for harsh environments that are easy to configure, deploy and manage, while at the same time adhering to science g...
Igor Talzi, Andreas Hasler, Stephan Gruber, Christ...
JSS
2007
115views more  JSS 2007»
13 years 7 months ago
A case study in re-engineering to enforce architectural control flow and data sharing
Without rigorous software development and maintenance, software tends to lose its original architectural structure and become difficult to understand and modify. ArchJava, a recen...
Marwan Abi-Antoun, Jonathan Aldrich, Wesley Coelho
HCI
2007
13 years 9 months ago
Web 2.0 Technology: Future Interfaces for Technology Enhanced Learning?
Web 2.0 is an emerging catch phrase and the applications associated with it shocked the traditional eLearning world. However, is this really all new and can it be considered suitab...
Martin Ebner, Andreas Holzinger, Hermann A. Maurer