Sciweavers

425 search results - page 71 / 85
» GUI Evaluation Through Web
Sort
View
ECEH
2006
101views Healthcare» more  ECEH 2006»
15 years 3 months ago
Towards European Patient Summaries based on Triple Space Computing
: Medical practice today still entails sorting through scattered information on a specific patient. Making things more difficult, the EU, in bringing its member states closer toget...
Dario Cerizza, Emanuele Della Valle, Doug Foxvog, ...
SOSP
1997
ACM
15 years 3 months ago
Application Performance and Flexibility on Exokernel Systems
The exokernel operating system architecture safely gives untrusted software efficient control over hardware and software resources by separating management from protection. This ...
M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ga...
ESE
2008
112views Database» more  ESE 2008»
15 years 1 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
115
Voted
JSW
2006
71views more  JSW 2006»
15 years 1 months ago
Semantics and Extensions of WS-Agreement
When having repeated interactions with a service provider, a service consumer might desire guarantees on the delivery of the service. These guarantees involve both functional and n...
Ganna Frankova, Daniela Malfatti, Marco Aiello
IMCS
2007
78views more  IMCS 2007»
15 years 1 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri