Sciweavers

1949 search results - page 257 / 390
» Protective Interface Specifications
Sort
View
132
Voted
CADE
2005
Springer
16 years 3 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
124
Voted
CSCW
2010
ACM
16 years 11 days ago
Socialization tactics in wikipedia and their effects
Socialization of newcomers is critical both for conventional groups. It helps groups perform effectively and the newcomers develop commitment. However, little empirical research h...
Boreum Choi, Kira Alexander, Robert E. Kraut, John...
146
Voted
WECWIS
2007
IEEE
172views ECommerce» more  WECWIS 2007»
15 years 9 months ago
An Analysis Tool for Execution of BPEL Services
Business Process Execution Language (BPEL) is an XML-based language for specifying services. There have been numerous recent research and development efforts in both statically an...
Ariane Gravel, Xiang Fu, Jianwen Su
BIBE
2007
IEEE
167views Bioinformatics» more  BIBE 2007»
15 years 7 months ago
Assessing the Performance of Macromolecular Sequence Classifiers
Machine learning approaches offer some of the most cost-effective approaches to building predictive models (e.g., classifiers) in a broad range of applications in computational bio...
Cornelia Caragea, Jivko Sinapov, Vasant Honavar, D...
128
Voted
EMSOFT
2007
Springer
15 years 7 months ago
Verification of device drivers and intelligent controllers: a case study
The soundness of device drivers generally cannot be verified in isolation, but has to take into account the reactions of the hardware devices. In critical embedded systems, interf...
David Monniaux