Sciweavers

1043 search results - page 94 / 209
» Using Function Generalization to Design a Cosequential Proce...
Sort
View
100
Voted
AOSD
2004
ACM
15 years 8 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
94
Voted
TIP
2008
98views more  TIP 2008»
15 years 2 months ago
On the Construction of Invertible Filter Banks on the 2-Sphere
The theories of signal sampling, filter banks, wavelets and "overcomplete wavelets" are well-established for the Euclidean spaces and are widely used in the processing a...
B. T. Thomas Yeo, Wanmei Ou, Polina Golland
129
Voted
WPES
2006
ACM
15 years 8 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
CHI
2008
ACM
16 years 3 months ago
Activity-based prototyping of ubicomp applications for long-lived, everyday human activities
We designed an activity-based prototyping process realized in the ActivityDesigner system that combines the theoretical framework of Activity-Centered Design with traditional iter...
Yang Li, James A. Landay
111
Voted
GRAPHICSINTERFACE
2007
15 years 4 months ago
Constrained planar remeshing for architecture
Material limitations and fabrication costs generally run at odds with the creativity of architectural design, producing a wealth of challenging computational geometry problems. We...
Barbara Cutler, Emily Whiting