Sciweavers

2741 search results - page 464 / 549
» Designing Law-Compliant Software Requirements
Sort
View
EICS
2009
ACM
15 years 4 months ago
Toward user interface virtualization: legacy applications and innovative interaction systems
Single-user, desktop-based computer applications are pervasive in our daily lives and work. The prospect of using these applications with innovative interaction systems, like mult...
Guillaume Besacier, Frédéric Vernier
IAT
2008
IEEE
15 years 4 months ago
An Ontology-Driven Framework for Deploying JADE Agent Systems
Multi-agent systems have proven to be a powerful technology for building complex distributed applications. However, the process of designing, configuring and deploying agent-based...
Csongor Nyulas, Martin J. O'Connor, Samson W. Tu, ...
ICAC
2007
IEEE
15 years 4 months ago
SLA Decomposition: Translating Service Level Objectives to System Level Thresholds
In today’s complex and highly dynamic computing environments, systems/services have to be constantly adjusted to meet Service Level Agreements (SLAs) and to improve resource uti...
Yuan Chen, Subu Iyer, Xue Liu, Dejan S. Milojicic,...
GPCE
2007
Springer
15 years 4 months ago
42: programmable models of computation for a component-based approach to heterogeneous embedded systems
Every notion of a component for the development of embedded systems has to take heterogeneity into account: components may be hardware or software or OS, synchronous or asynchrono...
Florence Maraninchi, Tayeb Bouhadiba
SAFECOMP
2007
Springer
15 years 4 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...