This paper reports our experience of evaluating an application that uses visualization approaches to support instructors in Web based distance education. The evaluation took place...
Distributed systems today are very vulnerable to malicious attacks, either from insiders or outsiders. When an attacker controls a component of the system, he may steal some sensi...
This paper describes the development of an experience factory in an Australian organization involved in the field of telecommunications. Faced with improvement needs, in 1998 the ...
Areas crucial to life such as medicine, transportation, nuclearenergy research and industry, aeronautics, and others, all make use of software in one way or another. However, the ...
W. Eric Wong, Vidroha Debroy, Adithya Surampudi, H...
A number of techniques and software tools for embedded system design have been recently proposed. However, the current practice in the designer community is heavily based on manua...
Alberto L. Sangiovanni-Vincentelli, Antonino Damia...