Sciweavers

272 search results - page 30 / 55
» Exploring the acceptability envelope
Sort
View
107
Voted
CCS
2009
ACM
15 years 10 months ago
Reactive noninterference
Many programs operate reactively, patiently waiting for user input, subsequently running for a while producing output, and eventually returning to a state where they are ready to ...
Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sj&oum...
ICC
2009
IEEE
130views Communications» more  ICC 2009»
15 years 10 months ago
Flexible Single Sign-On for SIP: Bridging the Identity Chasm
—Identity federation is a key requirement for today’s distributed services. This technology allows managed sharing of users’ identity information between identity providers (...
Pin Nie, Juha-Matti Tapio, Sasu Tarkoma, Jani Heik...
EVOW
2010
Springer
15 years 10 months ago
Investigating the Local-Meta-Model CMA-ES for Large Population Sizes
For many real-life engineering optimization problems, the cost of one objective function evaluation can take several minutes or hours. In this context, a popular approach to reduce...
Zyed Bouzarkouna, Anne Auger, Didier Yu Ding
ANSS
2008
IEEE
15 years 10 months ago
Executable Protocol Models as a Requirements Engineering Tool
Functional prototypes and simulations are a well recognised and valued tool for building a shared understanding of requirements between users and developers. However, the developm...
Ashley T. McNeile, Ella E. Roubtsova
158
Voted
DIGITEL
2008
IEEE
15 years 10 months ago
Development of Educational Videogames in m-Learning Contexts
The educational gaming field is rapidly growing both in acceptance and variety. Within this variety, the technological evolution of wireless/handheld (W/H) computing devices is op...
Pablo Lavín-Mera, Pablo Moreno-Ger, Baltasa...