Sciweavers

1771 search results - page 342 / 355
» An Aspect-Oriented Security Framework
Sort
View
89
Voted
SIGSOFT
2004
ACM
16 years 11 days ago
Reasoning about partial goal satisfaction for requirements and design engineering
Exploring alternative options is at the heart of the requirements and design processes. Different alternatives contribute to different degrees of achievement of non-functional goa...
Emmanuel Letier, Axel van Lamsweerde
89
Voted
WWW
2004
ACM
16 years 9 days ago
QoS computation and policing in dynamic web service selection
The emerging Service-Oriented Computing (SOC) paradigm promises to enable businesses and organizations to collaborate in an unprecedented way by means of standard web services. To...
Yutu Liu, Anne H. H. Ngu, Liangzhao Zeng
103
Voted
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 1 days ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
109
Voted
MOBISYS
2007
ACM
15 years 11 months ago
COMBINE: leveraging the power of wireless peers through collaborative downloading
Mobile devices are increasingly equipped with multiple network interfaces: Wireless Local Area Network (WLAN) interfaces for local connectivity and Wireless Wide Area Network (WWA...
Ganesh Ananthanarayanan, Venkata N. Padmanabhan, L...
PLDI
2010
ACM
15 years 9 months ago
Ur: Statically-Typed Metaprogramming with Type-Level Record Computation
Dependent types provide a strong foundation for specifying and verifying rich properties of programs through type-checking. The earliest implementations combined dependency, which...
Adam Chlipala