Sciweavers

3516 search results - page 597 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
129
Voted
SAC
2010
ACM
15 years 4 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
121
Voted
COMPUTER
2008
66views more  COMPUTER 2008»
15 years 3 months ago
Into the Wild: Low-Cost Ubicomp Prototype Testing
ions and techniques such as activity models, storyboards, and programming by demonstration (Y. Li and J. Landay, "Activity-Based Prototyping of Ubicomp Applications for Long-L...
Yang Li, James A. Landay
136
Voted
IJWIS
2008
150views more  IJWIS 2008»
15 years 3 months ago
COTS-based software product line development
ed Abstract: Purpose of this paper Software Product Line (SPL) is at the forefront among the techniques for reducing costs, decreasing schedule time, and ensuring commonality of fe...
Luiz Fernando Capretz, Faheem Ahmed, Shereef Al-Ma...
131
Voted
WSC
2004
15 years 5 months ago
Implementing the High Level Architecture in the Virtual Test Bed
The Virtual Test Bed (VTB) is a prototype of a virtual engineering environment to study operations of current and future space vehicles, spaceports, and ranges. The HighLevel Arch...
José A. Sepúlveda, Luis C. Rabelo, J...
118
Voted
HICSS
2009
IEEE
155views Biometrics» more  HICSS 2009»
15 years 10 months ago
Multidimensional Analysis of RFID Data in Logistics
In the domain of logistics, Radio Frequency Identification (RFID) promises a plethora of benefits due to an enhanced efficiency, accuracy, and preciseness of object identification...
Henning Baars, Xuanpu Sun