Sciweavers

361 search results - page 34 / 73
» Effecting change: coordination in large-scale software devel...
Sort
View
SIGSOFT
2008
ACM
16 years 15 days ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...

Lecture Notes
4961views
16 years 9 months ago
The Relational Data Model, Normalisation and effective Database Design
I have been designing and building applications, including the databases used by those applications, for several decades now. I have seen similar problems approached by different d...
Tony Marston
AAAI
1997
15 years 1 months ago
Intelligent Agents for the Synthetic Battlefield: A Company of Rotary Wing Aircraft
1 We have constructed a team of intelligent agents that perform the tasks of an attack helicopter company for a synthetic battlefield environment used for running largescale milita...
Randall W. Hill Jr., Johnny Chen, Jonathan Gratch,...
WICSA
2001
15 years 1 months ago
Focus: A Light-Weight, Incremental Approach to Software Architecture Recovery and Evolution
During the past decade, object-orientation (OO) has become the dominant software development methodology, accompanied by a number of modeling notations, programming languages, and...
Lei Ding, Nenad Medvidovic
ICIS
1997
15 years 1 months ago
A comprehensive model of anonymity in computer-supported group decision making
Drawing on recent theoretical efforts, a three dimensional model of anonymity in computer-supported group discussion is developed. Applying this model to a review of empirical lit...
Poppy L. McLeod