Sciweavers

3555 search results - page 525 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CHI
2004
ACM
16 years 4 months ago
Breaking the book: translating the chemistry lab book into a pervasive computing lab environment
The UK e-Science programme is relying on the evolution of the paper lab book into a pervasive data gathering lab system. To date take up of existing commercial or research lab boo...
Monica M. C. Schraefel, Gareth V. Hughes, Hugo R. ...
POPL
2008
ACM
16 years 4 months ago
A theory of contracts for web services
Contracts are behavioural descriptions of Web services. We devise a theory of contracts that formalises the compatibility of a client to a service, and the safe replacement of a s...
Giuseppe Castagna, Nils Gesbert, Luca Padovani
SIGMOD
2006
ACM
153views Database» more  SIGMOD 2006»
16 years 4 months ago
Interactive query formulation over web service-accessed sources
Integration systems typically support only a restricted set of queries over the schema they export. The reason is that the participating information sources contribute limited con...
Michalis Petropoulos, Alin Deutsch, Yannis Papakon...
UIST
2009
ACM
15 years 10 months ago
Enabling always-available input with muscle-computer interfaces
Previous work has demonstrated the viability of applying offline analysis to interpret forearm electromyography (EMG) and classify finger gestures on a physical surface. We extend...
T. Scott Saponas, Desney S. Tan, Dan Morris, Ravin...
158
Voted
ESOP
2005
Springer
15 years 9 months ago
A New Foundation for Control-Dependence and Slicing for Modern Program Structures
The notion of control dependence underlies many program analysis and transformation techniques used in numerous applications. Despite wide application, existing definitions and ap...
Venkatesh Prasad Ranganath, Torben Amtoft, Anindya...