Sciweavers

7380 search results - page 1398 / 1476
» Engineering Software Intensive Systems
Sort
View
COMSWARE
2006
IEEE
15 years 4 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
COMSWARE
2006
IEEE
15 years 4 months ago
Design keys to adapt web prefetching algorithms to environment conditions
— This paper focuses on the design process of web prefetching algorithms. The main goal of prefetching techniques in web is to reduce user perceived latency. Since these techniqu...
Josep Domènech, Julio Sahuquillo, Ana Pont,...
COMSWARE
2006
IEEE
15 years 4 months ago
WLAN location sharing through a privacy observant architecture
Abstract— In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links...
Kavitha Muthukrishnan, Nirvana Meratnia, Maria Eva...
SEW
2006
IEEE
15 years 4 months ago
Retrenching the Purse: Finite Exception Logs, and Validating the Small
The Mondex Electronic Purse is an outstanding example of industrial scale formal refinement, and was the first verification to achieve ITSEC level E6 certification. A formal a...
Richard Banach, Michael Poppleton, Susan Stepney
ML
2006
ACM
15 years 3 months ago
Seminal: searching for ML type-error messages
We present a new way to generate type-error messages in a polymorphic, implicitly, and strongly typed language (specifically Caml). Our method separates error-message generation ...
Benjamin S. Lerner, Dan Grossman, Craig Chambers
« Prev « First page 1398 / 1476 Last » Next »