Sciweavers

1522 search results - page 144 / 305
» Practical Exception Specifications
Sort
View
ICSE
2007
IEEE-ACM
16 years 2 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
HICSS
2010
IEEE
260views Biometrics» more  HICSS 2010»
15 years 8 months ago
Standardized Device Services - A Design Pattern for Service Oriented Integration of Medical Devices
Service oriented device architecture (SODA) is a promising approach for enabling a continuous IT support of medical processes in hospitals. However, there is a lack of specific de...
Christian Mauro, Ali Sunyaev, Jan Marco Leimeister...
ACSC
2009
IEEE
15 years 8 months ago
Improving the Transparency of Proxy Injection in Java
Due to their flexibility, proxies have been used for various purposes in standalone and distributed applications. More specifically, object-level proxies support fine grained capa...
Hendrik Gani, Caspar Ryan
HICSS
2009
IEEE
137views Biometrics» more  HICSS 2009»
15 years 8 months ago
Consumer Informedness and Hyperdifferentiation: An Empirical Test of the 'Trading Down' and 'Trading Out' Hypotheses
Consumer informedness plays a critical role in determining consumer choice. Companies now use hyperdifferentiation and resonance marketing strategies to benefit from the long-tail....
Robert J. Kauffman, Ting Li, Eric van Heck, Peter ...
HICSS
2009
IEEE
113views Biometrics» more  HICSS 2009»
15 years 8 months ago
Digital Forensics: Defining a Research Agenda
While many fields have well-defined research agendas, evolution of the field of digital forensics has been largely driven by practitioners in the field. As a result, the majority ...
Kara L. Nance, Brian Hay, Matt Bishop