Sciweavers

871 search results - page 154 / 175
» Specification of Coordinated Behaviour in the Software Devel...
Sort
View
128
Voted
SIGSOFT
2007
ACM
16 years 4 months ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...
153
Voted
JCIT
2007
192views more  JCIT 2007»
15 years 3 months ago
Action Representation for Natural Language Interfaces to Agent Systems
In this paper, we outline a framework for the development of natural language interfaces to agent systems with a focus on action representation. The architecture comprises a natur...
Christel Kemke
135
Voted
CHI
2005
ACM
16 years 3 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
106
Voted
AOSD
2004
ACM
15 years 9 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
102
Voted
WEBENG
2001
Springer
15 years 8 months ago
Web Engineering Resources
This paper introduces the Web Engineering Resources Portal (shortly WEP), as a basic Reference Model and Guide for the Web Engineers. WEP provides a general classification of Web E...