Sciweavers

146 search results - page 16 / 30
» Information Flow Analysis in a Discrete-Time Process Algebra
Sort
View
ICSM
2002
IEEE
15 years 2 months ago
The Information Gathering Strategies of Software Maintainers
In examining software maintenance processes for improvement opportunities, an obvious choice is information flow. Obtaining accurate, up-to-date, and useful information about a sy...
Carolyn B. Seaman
CAU
2004
192views Cryptology» more  CAU 2004»
14 years 11 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
BCSHCI
2008
14 years 11 months ago
Distributed cognition and mobile healthcare work
In this paper, we look at the application of the DiCoT methodology [4] to the analysis of a mobile healthcare setting. While the methodology includes a set of principles and theme...
Joseph McKnight, Gavin Doherty
CJ
2010
131views more  CJ 2010»
14 years 7 months ago
Probabilistic Approaches to Estimating the Quality of Information in Military Sensor Networks
an be used to abstract away from the physical reality by describing it as components that exist in discrete states with probabilistically invoked actions that change the state. The...
Duncan Gillies, David Thornley, Chatschik Bisdikia...
SIGSOFT
2006
ACM
15 years 10 months ago
Local analysis of atomicity sphere for B2B collaboration
Atomicity is a desirable property for business processes to conduct transactions in Business-to-Business (B2B) collaboration. Although it is possible to reason about atomicity of ...
Chunyang Ye, S. C. Cheung, W. K. Chan, Chang Xu