Sciweavers

872 search results - page 72 / 175
» Using Plans to Automate Software Applications
Sort
View
ISWC
2002
IEEE
14 years 1 months ago
Threat Response: A Compelling Application for Wearable Computing
This paper explores the application of wearable computer systems to threat response, exemplified by the Multi-functional Micro-controllable Interface Module (MMIM)/Digital Militar...
Noa M. Rensing, Evan Weststrate, Paul M. Zavracky,...
CSCW
2004
ACM
14 years 2 months ago
Sometimes you need to see through walls: a field study of application programming interfaces
Information hiding is one of the most important and influential principles in software engineering. It prescribes that software modules hide implementation details from other modu...
Cleidson R. B. de Souza, David F. Redmiles, Li-Te ...
CASES
2006
ACM
14 years 21 days ago
Efficient architectures through application clustering and architectural heterogeneity
Customizing architectures for particular applications is a promising approach to yield highly energy-efficient designs for embedded systems. This work explores the benefits of arc...
Lukasz Strozek, David Brooks
ISSRE
2010
IEEE
13 years 7 months ago
DoDOM: Leveraging DOM Invariants for Web 2.0 Application Robustness Testing
—Web 2.0 applications are increasing in popularity. However, they are also prone to errors because of their dynamic nature. This paper presents DoDOM, an automated system for tes...
Karthik Pattabiraman, Benjamin G. Zorn
ICMAS
2000
13 years 10 months ago
Using Similarity Criteria to Make Negotiation Trade-Offs
This paper addresses the issues involved in software agents making trade-offs during automated negotiations in which they have information uncertainty and resource limitations. In...
Peyman Faratin, Carles Sierra, Nicholas R. Jenning...