Sciweavers

890 search results - page 53 / 178
» Comparative expert reviews
Sort
View
109
Voted
IRI
2006
IEEE
15 years 6 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
MM
2005
ACM
93views Multimedia» more  MM 2005»
15 years 6 months ago
The multimedia challenges raised by pervasive games
Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devic...
Mauricio Capra, Milena Radenkovic, Steve Benford, ...
112
Voted
DIGRA
2003
Springer
15 years 6 months ago
Developing a hybrid of MMORPG and LARP using usability methods: the case of Takkar
This paper examines the idea of combining Live Action Role-Playing (LARP) and MMORPG into a hybrid game named Takkar. We developed three versions of Takkar in an iterative fashion...
Laust Juul Christensen, Thomas Tae-Yang Jør...
95
Voted
COMPSAC
2002
IEEE
15 years 5 months ago
From System Comprehension to Program Comprehension
Program and system comprehension are vital parts of the software maintenance process. We discuss the need for both perspectives and describe two methods that may be integrated to ...
Christos Tjortjis, Nicolas Gold, Paul J. Layzell, ...
91
Voted
ISSTA
2000
ACM
15 years 5 months ago
Requirements-based monitors for real-time systems
—Before designing safety- or mission-critical real-time systems, a specification of the required behavior of the system should be produced and reviewed by domain experts. After ...
Dennis K. Peters, David Lorge Parnas