Sciweavers

2835 search results - page 514 / 567
» Imperfect Requirements in Software Development
Sort
View
IDTRUST
2009
ACM
16 years 6 days ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
CODES
2009
IEEE
16 years 5 days ago
A standby-sparing technique with low energy-overhead for fault-tolerant hard real-time systems
Time redundancy (rollback-recovery) and hardware redundancy are commonly used in real-time systems to achieve fault tolerance. From an energy consumption point of view, time redun...
Alireza Ejlali, Bashir M. Al-Hashimi, Petru Eles
COMPSAC
2009
IEEE
16 years 5 days ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
ICSEA
2009
IEEE
16 years 2 days ago
Ontology Driven E-Government
: This paper presents an approach to model ontologies for the e-Government domain as a basis for an integrated e-Government environment. Over the last couple of years the applicati...
Peter Salhofer, Bernd Stadlhofer, Gerald Tretter
IEAAIE
2009
Springer
15 years 12 months ago
An Agent Model of Temporal Dynamics in Relapse and Recurrence in Depression
Abstract Unipolar depression is a mental disorder characterized by a persistent low mood and loss of awareness or contentment in usual activities [1]. Despite the modern era of pha...
Azizi Ab Aziz, Michel C. A. Klein, Jan Treur