Sciweavers

4445 search results - page 195 / 889
» Reflective Authorization Systems
Sort
View
CHI
2007
ACM
16 years 5 months ago
Appropriation of a MMS-based comic creator: from system functionalities to resources for action
Technologies can be used ? or appropriated ? in different ways by different users, but how do the use patterns evolve, and how can design facilitate such evolution? This paper app...
Antti Salovaara
STANDARDVIEW
1998
71views more  STANDARDVIEW 1998»
15 years 4 months ago
Network externalities in software systems
Network externalities are the effects on the value of a product that can be ascribed to the presence of a network of users of such product. They play an essential role in the busi...
Giancarlo Succi, Paolo Predonzani, Andrea Valerio,...
AGENTS
2000
Springer
15 years 9 months ago
An Architecture for Modeling Internet-Based Collaborative Agent Systems
Abstract. This paper describes an architecture for modeling cooperating systems of communicating agents. The authors’ goal is not that of providing a framework to implement multi...
Roberto A. Flores, Robert C. Kremer, Douglas H. No...
FM
2008
Springer
184views Formal Methods» more  FM 2008»
15 years 6 months ago
Safe and Reliable Metro Platform Screen Doors Control/Command Systems
In this article we would like to present some recent applications of the B formal method to the development of safety critical system. These SIL3/SIL41 compliant systems have their...
Thierry Lecomte
JODI
2010
115views more  JODI 2010»
14 years 11 months ago
ICE-Theorem - End to end semantically aware eResearch infrastructure for theses
: ICE-TheOREM was a project which made several important contributions to the repository domain, promoting deposit by integrating the repository with authoring workflows and enhanc...
Peter Sefton, Jim Downing