Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Large software projects often require a programmer to make changes to unfamiliar source code. This paper presents the results of a formative observational study of seven professio...
Robert DeLine, Amir Khella, Mary Czerwinski, Georg...
Location awareness is the key capability of mobilecomputingapplications. Despitehighdemand, indoor location technologies have not become truly ubiquitous mainly due to their requir...
In this paper, we investigate a combination of two techniques — instruction coding and instruction re-ordering — for optimizing energy in embedded processor control. We presen...
One of the main objectives of developing component-based software systems is to enable efficient building of systems through the integration of components. All component models def...