Sciweavers

8623 search results - page 1506 / 1725
» Software engineering for secure systems
Sort
View
SENSYS
2006
ACM
15 years 11 months ago
Capturing high-frequency phenomena using a bandwidth-limited sensor network
Small-form-factor, low-power wireless sensors—motes—are convenient to deploy, but lack the bandwidth to capture and transmit raw high-frequency data, such as human voices or n...
Ben Greenstein, Christopher Mar, Alex Pesterev, Sh...
214
Voted
WWW
2004
ACM
16 years 5 months ago
Converting UML to OWL ontologies
This paper presents automatic generation of the Web Ontology Language (OWL) from an UML model. The solution is based on an MDA-defined architecture for ontology development and th...
Dragan Gasevic, Dragan Djuric, Vladan Devedzic, Vi...
CHI
2004
ACM
16 years 5 months ago
Designing smooth connections between worlds
Currently there is a lack of explicit theories and few detailed guidelines to support the development of Mixed Reality (MR) technology and its varied applications. This research f...
Daniela Gorski Trevisan
EDBT
2008
ACM
141views Database» more  EDBT 2008»
16 years 5 months ago
Generating Highly Customizable SQL Parsers
Database technology and the Structured Query Language (SQL) have grown enormously in recent years. Applications from different domains have different requirements for using databa...
Gunter Saake, Marko Rosenmüller, Martin Kuhle...
FOSSACS
2010
Springer
15 years 12 months ago
Parameterised Multiparty Session Types
For many application-level distributed protocols and parallel algorithms, the set of participants, the number of messages or the interaction structure are only known at run-time. T...
Nobuko Yoshida, Pierre-Malo Deniélou, Andi ...
« Prev « First page 1506 / 1725 Last » Next »