Sciweavers

5843 search results - page 1024 / 1169
» Software Security in Practice
Sort
View
153
Voted
CHI
2004
ACM
16 years 4 months ago
Putting the users center stage: role playing and low-fi prototyping enable end users to design mobile systems
This paper sums up lessons learned from a sequence of cooperative design workshops where end users were enabled to design mobile systems through scenario building, role playing, a...
Dag Svanaes, Gry Seland
CADE
2007
Springer
16 years 4 months ago
Labelled Clauses
We add labels to first-order clauses to simultaneously apply superpositions to several proof obligations inside one clause set. From a theoretical perspective, the approach unifies...
Tal Lev-Ami, Christoph Weidenbach, Thomas W. Reps,...
137
Voted
EDBT
2008
ACM
188views Database» more  EDBT 2008»
16 years 4 months ago
FAME-DBMS: Tailor-made Data Management Solutions for Embedded Systems
Data management functionality is not only needed in large-scale server systems, but also in embedded systems. Resource restrictions and heterogeneity of hardware, however, complic...
Marko Rosenmüller, Norbert Siegmund, Horst Sc...
ICWS
2009
IEEE
16 years 1 months ago
A Conceptual Modeling Approach to Business Service Mashup Development
Professional mashups that include complex choreographies, data mediation, and result publishing within Web pages are still affected by implementation and design practices that rel...
Alessandro Bozzon, Marco Brambilla, Federico Miche...
98
Voted
CHI
2010
ACM
15 years 11 months ago
Designing with interactive example galleries
Designers often use examples for inspiration; examples offer contextualized instances of how form and content integrate. Can interactive example galleries bring this practice to e...
Brian Lee, Savil Srivastava, Ranjitha Kumar, Ronen...
« Prev « First page 1024 / 1169 Last » Next »