Sciweavers

729 search results - page 119 / 146
» From personal to shared annotations
Sort
View
SIGSOFT
2007
ACM
16 years 1 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska
SIGCSE
2009
ACM
143views Education» more  SIGCSE 2009»
15 years 7 months ago
Thinking about computational thinking
Jeannette Wing’s call for teaching Computational Thinking (CT) as a formative skill on par with reading, writing, and arithmetic places computer science in the category of basic...
James J. Lu, George H. L. Fletcher
EMSOFT
2005
Springer
15 years 6 months ago
High performance annotation-aware JVM for Java cards
Early applications of smart cards have focused in the area of personal security. Recently, there has been an increasing demand for networked, multi-application cards. In this new ...
Ana Azevedo, Arun Kejariwal, Alexander V. Veidenba...
109
Voted
SIGADA
2004
Springer
15 years 5 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
LWA
2004
15 years 1 months ago
An Assessment Framework for eLearning in the Semantic Web
In this paper we present a flexible assessment framework for eLearning based on semantic web technologies. The assessment techniques are formalized as reasoning rules. These rules...
Lilia Cheniti-Belcadhi, Nicola Henze, Rafik Braham