Sciweavers

2361 search results - page 338 / 473
» Embedded Systems - Challenges and Work Directions
Sort
View
151
Voted
WCRE
2010
IEEE
15 years 2 months ago
Studying the Impact of Clones on Software Defects
—There are numerous studies that examine whether or not cloned code is harmful to software systems. Yet, few of them study which characteristics of cloned code in particular lead...
Gehan M. K. Selim, Liliane Barbour, Weiyi Shang, B...
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
15 years 2 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
ICRA
2009
IEEE
117views Robotics» more  ICRA 2009»
15 years 1 months ago
Temporal stabilization of discrete movement in variable environments: An attractor dynamics approach
The ability to generate discrete movement with distinct and stable time courses is important for interaction scenarios both between different robots and with human partners, for ca...
Matthias Tuma, Ioannis Iossifidis, Gregor Schö...
ADVSE
2010
103views more  ADVSE 2010»
14 years 11 months ago
Extending Conceptual Schemas with Business Process Information
Abstract. The specification of business processes is becoming a more and more critical aspect for organizations. Such processes are specified as workflow models expressing the logi...
Marco Brambilla, Jordi Cabot, Sara Comai
141
Voted
CCS
2009
ACM
16 years 4 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin