Sciweavers

370 search results - page 63 / 74
» An Approach to Ad hoc Cloud Computing
Sort
View
IFM
2004
Springer
125views Formal Methods» more  IFM 2004»
15 years 3 months ago
Formally Justifying User-Centred Design Rules: A Case Study on Post-completion Errors
Abstract. Interactive systems combine a human operator with a computer. Either may be a source of error. The veri cation processes used must ensure both the correctness of the comp...
Paul Curzon, Ann Blandford
CCS
2003
ACM
15 years 2 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
ICDCS
2000
IEEE
15 years 2 months ago
Active Files: A Mechanism for Integrating Legacy Applications into Distributed Systems
Despite increasingly distributed internet information sources with diverse storage formats and access-control constraints, most of the end applications (e.g., filters and media p...
Partha Dasgupta, Ayal Itzkovitz, Vijay Karamcheti
CHI
2008
ACM
14 years 11 months ago
Using information scent to model the dynamic foraging behavior of programmers in maintenance tasks
In recent years, the software engineering community has begun to study program navigation and tools to support it. Some of these navigation tools are very useful, but they lack a ...
Joseph Lawrance, Rachel K. E. Bellamy, Margaret M....
COMCOM
2007
103views more  COMCOM 2007»
14 years 9 months ago
Using event detection latency to evaluate the coverage of a wireless sensor network
A wireless sensor network (WSN) consists of many tiny and low-power devices deployed in a sensing field. One of the major tasks of a WSN is to monitor the surrounding environment...
You-Chiun Wang, Kai-Yang Cheng, Yu-Chee Tseng