Sciweavers

1855 search results - page 177 / 371
» System Consequence
Sort
View
HCI
2007
15 years 5 months ago
Privacy Requirements in Identity Management Solutions
In this paper we highlight the need for privacy of user data used in digital identity management systems. We investigate the issues from the individual, business, and government pe...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
IJVR
2008
118views more  IJVR 2008»
15 years 4 months ago
HERA: Learner Tracking in a Virtual Environment
The main goals of using simulations and Virtual Environments for Training/Learning (VET/L) are to avoid risks and unwanted consequences, to reduce training costs, and to promote tr...
Kahina Amokrane, Domitile Lourdeaux, Jean-Marie Bu...
JCO
2008
85views more  JCO 2008»
15 years 4 months ago
Locating and detecting arrays for interaction faults
The identification of interaction faults in component-based systems has focussed on indicating the presence of faults, rather than their location and magnitude. While this is a va...
Charles J. Colbourn, Daniel W. McClary
IMCSIT
2010
14 years 11 months ago
Integration of Scheduling Analysis into UML Based Development Processes Through Model Transformation
The complexity of embedded systems and their safety requirements have risen significantly in recent years. Models and the model based development approach help to keep overview and...
Matthias Hagner, Ursula Goltz
OOPSLA
2004
Springer
15 years 9 months ago
A language-independent approach to software maintenance using grammar adapters
A long-standing goal of software engineering is to construct software that is easily modified and extended. Recent advances in software design techniques, such as aspect-oriented ...
Suman Roychoudhury