Sciweavers

8623 search results - page 1684 / 1725
» Software engineering for secure systems
Sort
View
BCSHCI
2008
13 years 10 months ago
Low cost prototyping: part 2, or how to apply the thinking-aloud method efficiently
Customer satisfaction with regard to user interfaces becomes increasingly more important and is, eventually, decisive for the selection of systems within a competitive market. End...
Andreas Holzinger, Stephen Brown
DAC
2008
ACM
14 years 10 months ago
Multithreaded simulation for synchronous dataflow graphs
Synchronous dataflow (SDF) has been successfully used in design tools for system-level simulation of wireless communication systems. Modern wireless communication standards involv...
Chia-Jui Hsu, José Luis Pino, Shuvra S. Bha...
WWW
2008
ACM
14 years 9 months ago
Efficient multi-keyword search over p2p web
Current search mechanisms of DHT-based P2P systems can well handle a single keyword search problem. Other than single keyword search, multi-keyword search is quite popular and use...
Hanhua Chen, Hai Jin, Jiliang Wang, Lei Chen 0002,...
WWW
2003
ACM
14 years 9 months ago
Supporting Cooperative Activities with Shared Hypermedia Workspaces on the WWW
Team members usually cooperate on a business process by partitioning it into several activities, which in turn generate one or more work items. Work items either need to be proces...
Jörg M. Haake, Jessica Rubart, Weigang Wang
WWW
2010
ACM
14 years 3 months ago
New-web search with microblog annotations
Web search engines discover indexable documents by recursively ‘crawling’ from a seed URL. Their rankings take into account link popularity. While this works well, it introduc...
Tom Rowlands, David Hawking, Ramesh Sankaranarayan...
« Prev « First page 1684 / 1725 Last » Next »