Sciweavers

871 search results - page 154 / 175
» Specification of Coordinated Behaviour in the Software Devel...
Sort
View
SIGSOFT
2007
ACM
14 years 9 months ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...
JCIT
2007
192views more  JCIT 2007»
13 years 8 months ago
Action Representation for Natural Language Interfaces to Agent Systems
In this paper, we outline a framework for the development of natural language interfaces to agent systems with a focus on action representation. The architecture comprises a natur...
Christel Kemke
CHI
2005
ACM
14 years 8 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
AOSD
2004
ACM
14 years 1 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
WEBENG
2001
Springer
14 years 26 days ago
Web Engineering Resources
This paper introduces the Web Engineering Resources Portal (shortly WEP), as a basic Reference Model and Guide for the Web Engineers. WEP provides a general classification of Web E...