Sciweavers

3516 search results - page 658 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ICSE
1999
IEEE-ACM
15 years 4 months ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...
ATAL
2003
Springer
15 years 5 months ago
Behaviors that emerge from emotion and cognition: implementation and evaluation of a symbolic-connectionist architecture
This paper describes the implementation and evaluation of a framework for modeling emotions in complex, decision-making agents. Sponsored by U.S. Army Research Institute (ARI), th...
Amy E. Henninger, Randolph M. Jones, Eric Chown
AIS
1999
Springer
14 years 11 months ago
Preserving communication context: Virtual workspace and interpersonal space in Japanese CSCW
The past decade has seen the development of a perspective holding that technology is socially constructed (Mackenzie and Wacjman, 1985; Bijker, Hughes and Pinch, 1987; Bijker and L...
Lorna Heaton
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
15 years 6 months ago
Demystifying magic: high-level low-level programming
r of high-level languages lies in their abstraction over hardware and software complexity, leading to greater security, better reliability, and lower development costs. However, o...
Daniel Frampton, Stephen M. Blackburn, Perry Cheng...
OOPSLA
2007
Springer
15 years 6 months ago
Scalable omniscient debugging
Omniscient debuggers make it possible to navigate backwards in time within a program execution trace, drastically improving the task of debugging complex applications. Still, they...
Guillaume Pothier, Éric Tanter, José...