Sciweavers

757 search results - page 80 / 152
» Composing Security-Aware Software
Sort
View
CHI
2007
ACM
16 years 3 months ago
Understanding memory triggers for task tracking
Software can now track which computer applications and documents you use. This provides us with the potential to help end-users recall past activities for tasks such as status rep...
A. J. Bernheim Brush, Brian Meyers, Desney S. Tan,...
190
Voted
SIGMOD
2006
ACM
92views Database» more  SIGMOD 2006»
16 years 3 months ago
Developing scientific workflows from heterogeneous services
Scientific WorkFlows (SWFs) need to utilize components and applications in order to satisfy the requirements of specific workflow tasks. Technology trends in software development ...
Aphrodite Tsalgatidou, George Athanasopoulos, Mich...
114
Voted
EDBT
2008
ACM
141views Database» more  EDBT 2008»
16 years 3 months ago
Generating Highly Customizable SQL Parsers
Database technology and the Structured Query Language (SQL) have grown enormously in recent years. Applications from different domains have different requirements for using databa...
Gunter Saake, Marko Rosenmüller, Martin Kuhle...
138
Voted
ECBS
2010
IEEE
224views Hardware» more  ECBS 2010»
15 years 10 months ago
Timed Automata Model for Component-Based Real-Time Systems
—One of the key challenges in modern real-time embedded systems is safe composition of different software components. Formal verification techniques provide the means for design...
Georgiana Macariu, Vladimir Cretu
97
Voted
SAC
2009
ACM
15 years 10 months ago
Body-and-cad geometric constraint systems
Motivated by constraint-based CAD software, we introduce a new, very general, rigidity model: the body-and-cad structure, composed of rigid bodies in 3D constrained by pairwise co...
Kirk Haller, Audrey Lee-St. John, Meera Sitharam, ...