Sciweavers

3555 search results - page 143 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
136
Voted
JTAER
2007
125views more  JTAER 2007»
15 years 3 months ago
Australian Case Studies in Mobile Commerce
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical m...
Jonathan O'Donnell, Margaret Jackson, Marita Shell...
DATAMINE
2002
139views more  DATAMINE 2002»
15 years 3 months ago
Using Site Semantics to Analyze, Visualize, and Support Navigation
To satisfy potential customers of a Web site and to lead them to the goods offered by the site, one should support them in the course of navigation they have embarked on. This pape...
Bettina Berendt
158
Voted
FASE
2004
Springer
15 years 9 months ago
Checking Absence of Illicit Applet Interactions: A Case Study
Abstract. This paper presents the use of a method – and its corresponding tool set – for compositional verification of applet interactions on a realistic industrial smart card...
Marieke Huisman, Dilian Gurov, Christoph Sprenger,...
VISUALIZATION
2003
IEEE
15 years 9 months ago
Counting Cases in Marching Cubes: Toward a Generic Algorithm for Producing Substitopes
We describe how to count the cases that arise in a family of visualization techniques, including Marching Cubes, Sweeping Simplices, Contour Meshing, Interval Volumes, and Separat...
David C. Banks, Stephen A. Linton
155
Voted
KCAP
2009
ACM
15 years 10 months ago
Biomedical knowledge engineering tools based on experimental design: a case study based on neuroanatomical tract-tracing experim
Curating information from the literature for storage in databases is a crucial task in biological research, and many groups assign a particular person or team to that process. We ...
Gully A. P. C. Burns, Thomas A. Russ