Sciweavers

559 search results - page 23 / 112
» Dating example for information architecture
Sort
View
IJCINI
2007
112views more  IJCINI 2007»
14 years 11 months ago
Neo-Symbiosis: The Next Stage in the Evolution of Human Information Interaction
The purpose of this paper is to re-address the vision of human-computer symbiosis as originally expressed by J.C.R. Licklider nearly a half-century ago and to argue for the releva...
Douglas Griffith, Frank L. Greitzer
ICSE
2003
IEEE-ACM
15 years 12 months ago
A Framework for Managing Traceability Relationships between Requirements and Architectures
Traceability helps stakeholders to understand the relationships that exist between software artifacts created during a software development project. For example, the evolution of ...
Susanne A. Sherba, Kenneth M. Anderson
ISCA
1990
IEEE
186views Hardware» more  ISCA 1990»
15 years 3 months ago
Adaptive Software Cache Management for Distributed Shared Memory Architectures
An adaptive cache coherence mechanism exploits semantic information about the expected or observed access behavior of particular data objects. We contend that, in distributed shar...
John K. Bennett, John B. Carter, Willy Zwaenepoel
FM
2008
Springer
130views Formal Methods» more  FM 2008»
15 years 1 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
CCS
2001
ACM
15 years 4 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons