Sciweavers

2154 search results - page 374 / 431
» Evidence-based software production
Sort
View
CHI
2009
ACM
15 years 5 months ago
Coordinating tasks on the commons: designing for personal goals, expertise and serendipity
How is work created, assigned, and completed on large-scale, crowd-powered systems like Wikipedia? And what design principles might enable these federated online systems to be mor...
Michel Krieger, Emily Margarete Stark, Scott R. Kl...
TEI
2009
ACM
115views Hardware» more  TEI 2009»
15 years 5 months ago
Fritzing: a tool for advancing electronic prototyping for designers
Today a growing community of DIY-practitioners, artists and designers are using microcontroller-based toolkits to express their concepts for digital artifacts by building them. Ho...
André Knörig, Reto Wettach, Jonathan C...
ICIW
2009
IEEE
15 years 5 months ago
A Model-Driven Approach for Monitoring Business Performance in Web Service Compositions
— Supporting business services through Web service compositions (WSC) as part of service-oriented architectures (SOA) involves business performance monitoring requirements. Their...
Christof Momm, Michael Gebhart, Sebastian Abeck
ICONS
2009
IEEE
15 years 5 months ago
Modeling System Safety Requirements Using Input/Output Constraint Meta-automata
Most recent software related accidents have been system accidents. To validate the absence of system hazards concerning dysfunctional interactions, industrials call for approaches...
Zhe Chen, Gilles Motet
IEEEIAS
2009
IEEE
15 years 5 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof