Sciweavers

3775 search results - page 551 / 755
» The Expression Problem Revisited
Sort
View
EUROSEC
2010
ACM
15 years 12 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
SIGCSE
2010
ACM
121views Education» more  SIGCSE 2010»
15 years 12 months ago
Using strategies for assessment of programming exercises
Programming exercise assessment tools alleviate the task of teachers, and increase consistency of markings. Many programming exercise assessment tools are based on testing. A test...
Alex Gerdes, Johan Jeuring, Bastiaan Heeren
AINA
2009
IEEE
15 years 12 months ago
Business Compliance Governance in Service-Oriented Architectures
Abstract — Governing business compliance with regulations, laws, best practices, contracts, and the like is not an easy task, and so far there are only limited software products ...
Florian Daniel, Fabio Casati, Vincenzo D'Andrea, E...
PADS
2009
ACM
15 years 12 months ago
An Approach for Validation of Semantic Composability in Simulation Models
Semantic composability aims to ensure that the composition of simulation components is meaningful in terms of their expressed behavior, and achieves the desired objective of the n...
Claudia Szabo, Yong Meng Teo
SAC
2009
ACM
15 years 12 months ago
Optimal service level allocation in environmentally powered embedded systems
Energy management is a critical concern in the design of embedded systems to prolong the lifetime or to maximize the performance under energy constraints. In particular, the emerg...
Clemens Moser, Jian-Jia Chen, Lothar Thiele