Recomposable software enables a system to change its structure and behavior during execution, in response to a dynamic execution environment. This paper proposes an approach to ensure that such adaptations are safe wi...
详细信息
Internet networked virtual environments, such as VRML-based environments, should provide a satisfactory immersive experience to users. However, the time needed to download them and display them in the user platform, a...
详细信息
ISBN:
(纸本)0946881324
Internet networked virtual environments, such as VRML-based environments, should provide a satisfactory immersive experience to users. However, the time needed to download them and display them in the user platform, as well as the time delays in effectively starting an interaction, may adversely influence the overall user satisfaction. This article shows the results of a series of usability tests oriented towards improving Internet networked virtual environments construction by analysing the influence of time delays and other problems in the users' perception of virtual environments.
Persistent use of an information technology is necessary if it is to enhance productivity and user satisfaction. In this paper, we examine the process of appropriation of an application software over time, to gain a d...
详细信息
Open-source and industrial softwaresystems often lack up-to-date documents on the implementation of user-observable functionalities. This lack of documents is particularly hindering for large systems. Moreover, as wi...
详细信息
ISBN:
(纸本)1595932437
Open-source and industrial softwaresystems often lack up-to-date documents on the implementation of user-observable functionalities. This lack of documents is particularly hindering for large systems. Moreover, as with any other software artifacts, user-observable functionalities evolve through software evolution activities. Evolution activities sometimes have undesired and unexpected side-effects on other functionalities, causing these to fail or to malfunction. In this position paper, we promote the idea that a traceability link between user-observable functionalities and constituents of a software architecture (classes, methods. . . implementing the functionalities) is essential to reduce the software evolution effort. We outline an approach to recover and to study the evolution of features -subsets of the constituents of a software architecture - responsible for a functionality. Copyright 2005 ACM.
The need for mass-produced inexpensive wireless devices operating under strict energy constraints poses new challenges in the system design methodology. This paper presents a methodology for designing wireless nodes i...
详细信息
The need for mass-produced inexpensive wireless devices operating under strict energy constraints poses new challenges in the system design methodology. This paper presents a methodology for designing wireless nodes in which a low cost, reliable antenna is realized by printed circuit traces. We show how to combine the analysis from 2.5D and 3D EM simulators with the PCB design tools to create predictable nodes with printed antennas that meet stringent power and data transmission range goals. The presented approach is applied to the design of a IEEE802.15.4 wireless node deployed in several indoor environments. Copyright 2005 ACM.
Web applications exhibit dynamic behaviour through such features as animation, rapidly changing presentations, and interactive forms. The growing complexity of web applications requires a rigorous modelling approach c...
详细信息
Security engineering deals with modeling, analysis, and implementation of complex security mechanisms. The dynamic nature of such mechanisms makes it difficult to anticipate undesirable emergent behavior. In this work...
详细信息
There are many potential users and uses for grid computing. However, the concept of sharing computing resources excites security concerns and, whilst being powerful and flexible, at least for novices, existing systems...
详细信息
Secure Progressively Updatable Traffic Emergency Response System (SPUTERS) is a framework for collecting traffic-surveillance data in crash-prone areas of roadways. SPUTERS receives as input video, audio, and text-bas...
详细信息
暂无评论