Sciweavers

2578 search results - page 445 / 516
» A Family-Oriented Software Development Process for Engine Co...
Sort
View
FASE
2009
Springer
15 years 9 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
IUI
2006
ACM
15 years 9 months ago
The delivery of multimedia presentations in a graphical user interface environment
A major issue in many domains is to present information to people that is tailored to their need, in such a way that it supports them in their tasks. In this paper, we present the...
Nathalie Colineau, Julien Phalip, Andrew Lampert
IUI
2005
ACM
15 years 8 months ago
Animating an interactive conversational character for an educational game system
Within the framework of the project NICE (Natural Interactive Communication for Edutainment) [2], we have been developing an educational and entertaining computer game that allows...
Andrea Corradini, Manish Mehta, Niels Ole Bernsen,...
IUI
2005
ACM
15 years 8 months ago
Automated email activity management: an unsupervised learning approach
Many structured activities are managed by email. For instance, a consumer purchasing an item from an e-commerce vendor may receive a message confirming the order, a warning of a ...
Nicholas Kushmerick, Tessa A. Lau
AOSD
2004
ACM
15 years 8 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh