Sciweavers

16206 search results - page 3190 / 3242
» At Issue
Sort
View
145
Voted
SADFE
2010
IEEE
14 years 8 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen
SIGSOFT
2010
ACM
14 years 8 months ago
Managing technical debt in software-reliant systems
Delivering increasingly complex software-reliant systems demands better ways to manage the long-term effects of shortterm expedients. The technical debt metaphor is gaining signif...
Nanette Brown, Yuanfang Cai, Yuepu Guo, Rick Kazma...
107
Voted
SOCA
2010
IEEE
14 years 8 months ago
Towards a diamond SOA operational model
The triangular operational model with the three roles of service-registry, -provider, and -consumer has been the traditional operational model in Service-oriented Architectures (SO...
Mohammed AbuJarour, Felix Naumann
84
Voted
UIST
2010
ACM
14 years 8 months ago
VizWiz: nearly real-time answers to visual questions
Visual information pervades our environment. Vision is used to de cide everything from what we want to eat at a restaurant and which bus route to take to whether our clothes match...
Jeffrey P. Bigham, Chandrika Jayant, Hanjie Ji, Gr...
VSTTE
2010
Springer
14 years 8 months ago
Dafny Meets the Verification Benchmarks Challenge
A suite of verification benchmarks for software verification tools and techniques, presented at VSTTE 2008 [11], provides an initial catalogue of benchmark challenges for the Verif...
K. Rustan M. Leino, Rosemary Monahan
« Prev « First page 3190 / 3242 Last » Next »