Sciweavers

1432 search results - page 103 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
138
Voted
PERCOM
2005
ACM
16 years 3 months ago
Applying a Disciplined Approach to the Development of a Context-Aware Communication Application
Pervasive computing applications must be engineered to provide unprecedented levels of flexibility in order to reconfigure and adapt in response to changes in computing resources ...
Ted McFadden, Karen Henricksen, Jadwiga Indulska, ...
126
Voted
CSCWD
2005
Springer
15 years 9 months ago
Analyzing groupware design by means of usability results
GOMS is a well-known model that has been successfully used in predicting the performance of humancomputer interaction, identifying usability problems and improving user-interface ...
Pedro Antunes, Marcos R. S. Borges, José A....
138
Voted
HICSS
2007
IEEE
126views Biometrics» more  HICSS 2007»
15 years 5 months ago
Model Driven Design and Implementation of Statistical Surveys
We describe the evolution of a statistical survey design visual language from a standalone design-time modelling language into an environment supporting design, coordination, exec...
Chul Hwee Kim, John G. Hosking, John C. Grundy
SEFM
2006
IEEE
15 years 9 months ago
Modeling Heterogeneous Real-time Components in BIP
We present a methodology for modeling heterogeneous real-time components. Components are obtained as the superposition of three layers : Behavior, specified as a set of transitio...
Ananda Basu, Marius Bozga, Joseph Sifakis
162
Voted
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 7 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...