Sciweavers

15779 search results - page 2607 / 3156
» Change-oriented software engineering
Sort
View
WCRE
2005
IEEE
15 years 10 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
MM
2005
ACM
124views Multimedia» more  MM 2005»
15 years 10 months ago
MusicStory: a personalized music video creator
In this paper, we describe MusicStory, a system that automatically creates videos to accompany music with lyrics. MusicStory uses common search engines, photo-sharing websites, an...
David A. Shamma, Bryan Pardo, Kristian J. Hammond
AOSE
2005
Springer
15 years 10 months ago
Incorporating Commitment Protocols into Tropos
This paper synthesizes two trends in the engineering of agent-based systems. One, modern agent-oriented methodologies deal with the key aspects of software development including re...
Ashok U. Mallya, Munindar P. Singh
SEMWEB
2005
Springer
15 years 10 months ago
Finding and Ranking Knowledge on the Semantic Web
Abstract. Swoogle helps software agents and knowledge engineers find Semantic Web knowledge encoded in RDF and OWL documents on the Web. Navigating such a Semantic Web on the Web ...
Li Ding, Rong Pan, Timothy W. Finin, Anupam Joshi,...
UIST
2004
ACM
15 years 10 months ago
Tangible NURBS-curve manipulation techniques using graspable handles on a large display
This paper presents tangible interaction techniques for fine-tuning one-to-one scale NURBS curves on a large display for automotive design. We developed a new graspable handle wit...
Seok-Hyung Bae, Takahiro Kobayash, Ryugo Kijima, W...
« Prev « First page 2607 / 3156 Last » Next »