Sciweavers

2741 search results - page 466 / 549
» Designing Law-Compliant Software Requirements
Sort
View
AISADM
2005
Springer
15 years 3 months ago
An Architecture for Distributed Agent-Based Data Preprocessing
Advances in agent technologies have fueled interest towards combining agent-based techniques with tools from data mining. Furthermore, the advent of the ubiquitous computing paradi...
Petteri Nurmi, Michael Przybilski, Greger Lind&eac...
EGC
2005
Springer
15 years 3 months ago
The University of Virginia Campus Grid: Integrating Grid Technologies with the Campus Information Infrastructure
Abstract. Grid software often unfortunately requires significant changes in existing infrastructure, both in terms of policy and mechanism, instead of accommodating and leveraging ...
Marty Humphrey, Glenn S. Wasson
UIST
2004
ACM
15 years 3 months ago
Simple vs. compound mark hierarchical marking menus
We present a variant of hierarchical marking menus where items are selected using a series of inflection-free simple marks, rather than the single "zig-zag" compound mar...
Shengdong Zhao, Ravin Balakrishnan
FC
2004
Springer
88views Cryptology» more  FC 2004»
15 years 3 months ago
Mental Models of Computer Security
Improved computer security requires improvements in risk communication to naive end users. Efficacy of risk communication depends not only on the nature of the risk, but also on t...
L. Jean Camp
ICFEM
2004
Springer
15 years 3 months ago
Timed Patterns: TCOZ to Timed Automata
Abstract. The integrated logic-based modeling language, Timed Communicating Object Z (TCOZ), is well suited for presenting complete and coherent requirement models for complex real...
Jin Song Dong, Ping Hao, Shengchao Qin, Jun Sun 00...