Sciweavers

2429 search results - page 344 / 486
» Using Aspects to Design a Secure System
Sort
View
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
15 years 3 months ago
User Centred Opportunities for Supporting Consumer Behaviour Through Handheld and Ubiquitous Computing
Moving around our physical environment, we are surrounded and interact with information that exhorts and stimulates us to buy things. For most of us, not all of these impulses are...
Kenton O'Hara, Mark Perry
COMPSAC
2002
IEEE
15 years 3 months ago
Multi-Criteria Preference Analysis for Systematic Requirements Negotiation
Many software projects have failed because their requirements were poorly negotiated among stakeholders. This paper proposes a systematic model, called "MultiCriteria Prefere...
Hoh Peter In, David Olson, Tom Rodgers
IPPS
1998
IEEE
15 years 2 months ago
Managing Concurrent Access for Shared Memory Active Messages
Passing messages through shared memory plays an important role on symmetric multiprocessors and on Clumps. The management of concurrent access to message queues is an important as...
Steven Lumetta, David E. Culler
ACMICEC
2006
ACM
120views ECommerce» more  ACMICEC 2006»
15 years 1 months ago
A semantic-based fully visual application for matchmaking and query refinement in B2C e-marketplaces
This paper presents a visual application in the framework of semantic-enabled e-marketplaces aimed at fully exploiting semantics of supply/demand descriptions in B2C and C2C e-mar...
Simona Colucci, Tommaso Di Noia, Eugenio Di Sciasc...
WICSA
2008
14 years 11 months ago
Ready! Set! Go! An Action Research Agenda for Software Architecture Research
Software architecture practice is highly complex. Software architects interact with business as well as technical aspects of systems, often embedded in large and changing organiza...
Henrik Bærbak Christensen, Klaus Marius Hans...