Sciweavers

7080 search results - page 1055 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
ICAIL
2007
ACM
15 years 8 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
SIGSOFT
2010
ACM
15 years 2 months ago
Rethinking the economics of software engineering
Reliance on skilled developers reduces the return on investment for important software engineering tasks such as establishing program correctness. This position paper introduces a...
Todd W. Schiller, Michael D. Ernst
ASSETS
2009
ACM
15 years 2 months ago
VocaliD: personalizing text-to-speech synthesis for individuals with severe speech impairment
Speech synthesis options on assistive communication devices are very limited and do not reflect the user’s vocal quality or personality. Previous work suggests that speakers wit...
Camil Jreige, Rupal Patel, H. Timothy Bunnell
CHI
2008
ACM
16 years 5 months ago
Ubipay: conducting everyday payments with minimum user involvement
As services embedded into public spaces become increasingly transparent, one peripheral aspect of use continues to demand explicit user attention: payment. UbiPay is a system that...
Vili Lehdonvirta, Hayuru Soma, Hitoshi Ito, Hiroak...
SGAI
2009
Springer
15 years 11 months ago
Explaining How to Play Real-Time Strategy Games
Real-time strategy games share many aspects with real situations in domains such as battle planning, air traffic control, and emergency response team management which makes them a...
Ronald A. Metoyer, Simone Stumpf, Christoph Neuman...
« Prev « First page 1055 / 1416 Last » Next »