Sciweavers

3555 search results - page 207 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
EJC
2010
14 years 11 months ago
Modelling a Query Space Using Associations
We all use our associative memory constantly. Words and concepts form paths that we can follow to find new related concepts; for example, when we think about a car we may associate...
Mika Timonen, Paula Silvonen, Melissa Kasari
ETFA
2008
IEEE
15 years 10 months ago
Pinpointing interrupts in embedded real-time systems using context checksums
When trying to track down bugs using cyclic debugging, the ability to correctly reproduce executions is imperative. In sequential, deterministic, non-real-time software, this repr...
Daniel Sundmark, Henrik Thane
CAEPIA
2003
Springer
15 years 9 months ago
Social Analysis of Multi-agent Systems with Activity Theory
The development of software systems is a complex task that requires support techniques to guide the process and solve inconsistencies in its . In the agent paradigm, the use of soc...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
SEMWEB
2007
Springer
15 years 10 months ago
Enabling the Semantic Web with Ready-to-Use Web Widgets
A lot of functionality is needed when an application, such as a museum cataloguing system, is extended with semantic capabilities, for example ontological indexing functionality or...
Eetu Mäkelä, Kim Viljanen, Olli Alm, Jou...
SAC
2010
ACM
15 years 11 months ago
Performance and extension of user space file systems
Several efforts have been made over the years for developing file systems in user space. Many of these efforts have failed to make a significant impact as measured by their us...
Aditya Rajgarhia, Ashish Gehani