Sciweavers

599 search results - page 86 / 120
» Workshop on Software Engineering and Mobility
Sort
View
ASWEC
2006
IEEE
14 years 2 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
RE
2004
Springer
14 years 2 months ago
The Conundrum of Categorising Requirements: Managing Requirements for Learning on the Move
This paper reports on our experience of eliciting and managing requirements on a large European-based multinational project, whose purpose is to create a system to support learnin...
Debra Trusso Haley, Bashar Nuseibeh, Helen C. Shar...
SEM
2004
Springer
14 years 2 months ago
Towards the Development of Ubiquitous Middleware Product Lines
Abstract. Ubiquitous computing is a challenge for the design of middleware. The reasons are resource constraints, mobility, heterogeneity, etc., just to name a few. We argue that s...
Sven Apel, Klemens Böhm
IUI
2003
ACM
14 years 1 months ago
Tool support for designing nomadic applications
Model-based approaches can be useful when designing nomadic applications, which can be accessed through multiple interaction s. Various models and levels of abstraction can be con...
Giulio Mori, Fabio Paternò, Carmen Santoro
ECOOPWEXCEPTION
2000
Springer
14 years 1 months ago
Portable Implementation of Continuation Operators in Imperative Languages by Exception Handling
Abstract. This paper describes a scheme of manipulating (partial) continuations in imperative languages such as Java and C++ in a portable manner, where the portability means that ...
Tatsurou Sekiguchi, Takahiro Sakamoto, Akinori Yon...