Sciweavers

1012 search results - page 122 / 203
» Identification of System Software Components Using Clusterin...
Sort
View
112
Voted
SOCIALCOM
2010
15 years 2 days ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
101
Voted
IAJIT
2007
90views more  IAJIT 2007»
15 years 2 months ago
Software Reuse for Mobile Robot Applications Through Analysis Patterns
: Software analysis pattern is an approach of software reuse which provides a way to reuse expertise that can be used across domains at early level of development. Developing softw...
Dayang N. A. Jawawi, Safaai Deris, Rosbi Mamat
131
Voted
AVI
2004
15 years 3 months ago
Observing and adapting user behavior in navigational 3D interfaces
In a navigation-oriented interaction paradigm, such as desktop, mixed and augmented virtual reality, recognizing the user needs is a valuable improvement, provided that the system...
Augusto Celentano, Fabio Pittarello
KBSE
2002
IEEE
15 years 7 months ago
Report on the Workshop on the State of the Art in Automated Software Engineering
ort gives their abstracts. s of the position papers Recent Experiences with Code Generation and Task Automation Agents in Software Tools (J. Grundy, J. Hosking) As software grows i...
Yves Ledru, David F. Redmiles
115
Voted
RAID
2010
Springer
15 years 18 days ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh