Sciweavers

272 search results - page 30 / 55
» Exploring the acceptability envelope
Sort
View
CCS
2009
ACM
15 years 4 months ago
Reactive noninterference
Many programs operate reactively, patiently waiting for user input, subsequently running for a while producing output, and eventually returning to a state where they are ready to ...
Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sj&oum...
ICC
2009
IEEE
130views Communications» more  ICC 2009»
15 years 4 months ago
Flexible Single Sign-On for SIP: Bridging the Identity Chasm
—Identity federation is a key requirement for today’s distributed services. This technology allows managed sharing of users’ identity information between identity providers (...
Pin Nie, Juha-Matti Tapio, Sasu Tarkoma, Jani Heik...
EVOW
2010
Springer
15 years 4 months ago
Investigating the Local-Meta-Model CMA-ES for Large Population Sizes
For many real-life engineering optimization problems, the cost of one objective function evaluation can take several minutes or hours. In this context, a popular approach to reduce...
Zyed Bouzarkouna, Anne Auger, Didier Yu Ding
ANSS
2008
IEEE
15 years 4 months ago
Executable Protocol Models as a Requirements Engineering Tool
Functional prototypes and simulations are a well recognised and valued tool for building a shared understanding of requirements between users and developers. However, the developm...
Ashley T. McNeile, Ella E. Roubtsova
96
Voted
DIGITEL
2008
IEEE
15 years 4 months ago
Development of Educational Videogames in m-Learning Contexts
The educational gaming field is rapidly growing both in acceptance and variety. Within this variety, the technological evolution of wireless/handheld (W/H) computing devices is op...
Pablo Lavín-Mera, Pablo Moreno-Ger, Baltasa...