Sciweavers

2663 search results - page 187 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
ASE
2007
121views more  ASE 2007»
14 years 10 months ago
Computer-aided Support for Secure Tropos
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Fabio Massacci, John Mylopoulos, Nicola Zannone
P2P
2010
IEEE
152views Communications» more  P2P 2010»
14 years 9 months ago
Autonomous NAT Traversal
—Traditional NAT traversal methods require the help of a third party for signalling. This paper investigates a new autonomous method for establishing connections to peers behind ...
Andreas Müller, Nathan S. Evans, Christian Gr...
LDTA
2010
14 years 8 months ago
Using DSLs for developing enterprise systems
This paper investigates the suitability of contemporary DSL tools in the context of enterprise software development. The main focus is on integration issues between the DSL tool, ...
Margus Freudenthal
NAACL
2010
14 years 8 months ago
Engaging learning groups using Social Interaction Strategies
Conversational Agents have been shown to be effective tutors in a wide range of educational domains. However, these agents are often ignored and abused in collaborative learning s...
Rohit Kumar, Carolyn Penstein Rosé
SIGMOD
2005
ACM
145views Database» more  SIGMOD 2005»
15 years 10 months ago
Stratified Computation of Skylines with Partially-Ordered Domains
In this paper, we study the evaluation of skyline queries with partially-ordered attributes. Because such attributes lack a total ordering, traditional index-based evaluation algo...
Chee Yong Chan, Pin-Kwang Eng, Kian-Lee Tan