Sciweavers

7380 search results - page 1278 / 1476
» Engineering Software Intensive Systems
Sort
View
WCRE
2005
IEEE
15 years 8 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
MM
2005
ACM
124views Multimedia» more  MM 2005»
15 years 8 months ago
MusicStory: a personalized music video creator
In this paper, we describe MusicStory, a system that automatically creates videos to accompany music with lyrics. MusicStory uses common search engines, photo-sharing websites, an...
David A. Shamma, Bryan Pardo, Kristian J. Hammond
AOSE
2005
Springer
15 years 8 months ago
Incorporating Commitment Protocols into Tropos
This paper synthesizes two trends in the engineering of agent-based systems. One, modern agent-oriented methodologies deal with the key aspects of software development including re...
Ashok U. Mallya, Munindar P. Singh
EMSOFT
2003
Springer
15 years 8 months ago
Event Correlation: Language and Semantics
Abstract. Event correlation is a service provided by middleware platforms that allows components in a publish/subscribe architecture to subscribe to patterns of events rather than ...
César Sánchez, Sriram Sankaranarayan...
SIGIR
2010
ACM
15 years 6 months ago
Evaluating whole-page relevance
Whole page relevance defines how well the surface-level representation of all elements on a search result page and the corresponding holistic attributes of the presentation respon...
Peter Bailey, Nick Craswell, Ryen W. White, Liwei ...
« Prev « First page 1278 / 1476 Last » Next »