Sciweavers

1015 search results - page 167 / 203
» Usability Engineering integrated with Requirements Engineeri...
Sort
View
VLDB
2004
ACM
105views Database» more  VLDB 2004»
15 years 3 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
3DIM
2003
IEEE
15 years 3 months ago
Stable Real-Time Interaction Between Virtual Humans And Real Scenes
We present an Augmented Reality system that relies on purely passive techniques to solve the real-time registration problem. It can run on a portable PC and does not require engin...
Luca Vacchetti, Vincent Lepetit, George Papagianna...
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
15 years 3 months ago
Toward More Robust Infrastructure: Observations on Improving the Resilience and Reliability of Critical Systems
Civil infrastructure provides the range of essential services generally necessary to support a nation’s economy and quality of life—arguably entire economies rely on the abili...
Richard G. Little
DAC
2003
ACM
15 years 3 months ago
A timing-accurate modeling and simulation environment for networked embedded systems
The design of state-of-the-art, complex embedded systems requires the capability of modeling and simulating the complex networked environment in which such systems operate. This i...
Franco Fummi, Giovanni Perbellini, Paolo Gallo, Ma...
AWIC
2003
Springer
15 years 3 months ago
Formalization of Web Design Patterns Using Ontologies
Design patterns have been enthusiastically embraced in the software engineering community as well as in the web community since they capture knowledge about how and when to apply a...
Susana Montero, Paloma Díaz, Ignacio Aedo