The life and death of statically detected vulnerabilities: An empirical study Fulltext Access 16 Pages 2009
Resource allocation on computational grids using a utility model and the knapsack problem Fulltext Access 16 Pages 2009
A semi-automatic usage-based method for improving hyperlink descriptions in menus Fulltext Access 16 Pages 2009
Designing for e-science: Requirements gathering for collaboration in CiteSeer Fulltext Access 16 Pages 2009
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science Fulltext Access 16 Pages 2009
A UML profile for the conceptual modelling of data-mining with time-series in data warehouses Fulltext Access 16 Pages 2009
Normal people working in normal organizations with normal equipment: System safety and cognition in a mid-air collision Fulltext Access 16 Pages 2009
Supporting user-oriented analysis for multi-view domain-specific visual languages Fulltext Access 16 Pages 2009
Level of detail in UML models and its impact on model comprehension: A controlled experiment Fulltext Access 16 Pages 2009
On the generation of requirements specifications from software engineering models: A systematic literature review Fulltext Access 17 Pages 2009
Deriving topological relations between regions from direction relations Fulltext Access 17 Pages 2009
Phenomena – A visual environment for querying heterogenous spatial data Fulltext Access 17 Pages 2009
Towards a framework to select techniques for error prediction: Supporting novice users in the healthcare sector Fulltext Access 17 Pages 2009
Generic and reflective graph transformations for checking and enforcement of modeling guidelines Fulltext Access 17 Pages 2009
A framework for developing measurement systems and its industrial evaluation Fulltext Access 17 Pages 2009
Requirements-based Access Control Analysis and Policy Specification (ReCAPS) Fulltext Access 17 Pages 2009
Experimental comparison of attack trees and misuse cases for security threat identification Fulltext Access 17 Pages 2009
Automated stress detection using keystroke and linguistic features: An exploratory study Fulltext Access 17 Pages 2009
A survey of scheduling metrics and an improved ordering policy for list schedulers operating on workloads with dependencies and a wide variation in execution times Fulltext Access 17 Pages 2009
Design representations of moving bodies for interactive, motion-sensing spaces Fulltext Access 17 Pages 2009
Piles across space: Breaking the real-estate barrier on small-display devices Fulltext Access 17 Pages 2009
Supporting novice usability practitioners with usability engineering tools Fulltext Access 17 Pages 2009
Predicting presence: Constructing the Tendency toward Presence Inventory Fulltext Access 17 Pages 2009
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility Fulltext Access 18 Pages 2009
XRound: A reversible template language and its application in model-based security analysis Fulltext Access 18 Pages 2009
Motion marking menus: An eyes-free approach to motion input for handheld devices Fulltext Access 18 Pages 2009
Toward the design and evaluation of continuous sound in tangible interfaces: The Spinotron Fulltext Access 18 Pages 2009
Building test cases and oracles to automate the testing of web database applications Fulltext Access 18 Pages 2009
How do we program the home? Gender, attention investment, and the psychology of programming at home Fulltext Access 18 Pages 2009
An approach for concurrent evaluation of technical and social aspects of software development methodologies Fulltext Access 18 Pages 2009
Enhancing personal communication with spatial haptics: Two scenario-based experiments on gestural interaction Fulltext Access 18 Pages 2009
Consistency preserving co-evolution of formal specifications and agent-oriented conceptual models Fulltext Access 19 Pages 2009
Immersive authoring of Tangible Augmented Reality content: A user study Fulltext Access 19 Pages 2009
Multimodal selection techniques for dense and occluded 3D virtual environments Fulltext Access 19 Pages 2009
Home curation versus teenage photography: Photo displays in the family home Fulltext Access 19 Pages 2009
Introducing requirements traceability support in model-driven development of web applications Fulltext Access 20 Pages 2009
On the secure software development process: CLASP, SDL and Touchpoints compared Fulltext Access 20 Pages 2009
Towards a general model of the multi-criteria workflow scheduling on the grid Fulltext Access 20 Pages 2009
Perceived interactivity leading to e-loyalty: Development of a model for cognitive–affective user responses Fulltext Access 20 Pages 2009
Model-Based Development of firewall rule sets: Diagnosing model inconsistencies Fulltext Access 22 Pages 2009
A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach Fulltext Access 23 Pages 2009
Security practitioners in context: Their activities and interactions with other stakeholders within organizations Fulltext Access 23 Pages 2009
A systematic literature review to identify and classify software requirement errors Fulltext Access 23 Pages 2009
Interacting meaningfully with machine learning systems: Three experiments Fulltext Access 24 Pages 2009
Definitions and approaches to model quality in model-based software development – A review of literature Fulltext Access 24 Pages 2009
Using physical memorabilia as opportunities to move into collocated digital photo-sharing Fulltext Access 25 Pages 2009
The practical application of a process for eliciting and designing security in web service systems Fulltext Access 27 Pages 2009
Adaptive Agent Model: Software Adaptivity using an Agent-oriented Model-Driven Architecture Fulltext Access 29 Pages 2009
Patterns-based evaluation of open source BPM systems: The cases of jBPM, OpenWFE, and Enhydra Shark Fulltext Access 30 Pages 2009
A heuristic personality-based bilateral multi-issue bargaining model in electronic commerce Fulltext Access 35 Pages 2009
Robot ethics? Not yet: A reflection on Whitby’s “Sometimes it’s hard to be a robot” Fulltext Access 4 Pages 2008
Response to “Sometimes it's hard to be a robot: A call for action on the ethics of abusing artificial agents” Fulltext Access 4 Pages 2008
Synthesis of SrAl2O4: Eu2+, Dy3+, Gd3+ phosphor by combustion method and its phosphorescence properties Fulltext Access 4 Pages 2008
Investigation of top-emitting organic light-emitting devices with highly saturated color employing metal-mirror structure Fulltext Access 4 Pages 2008
Green organic light-emitting diodes with improved stability and efficiency utilizing a wide band gap material as the host Fulltext Access 4 Pages 2008
Small molecular and polymer organic light-emitting diodes based on novel iridium complex phosphor Fulltext Access 4 Pages 2008
Ultraviolet embossed alignment layers having patterned spacers for flexible liquid crystal display Fulltext Access 4 Pages 2008
Highly efficient phosphorescent polymer OLEDs fabricated by screen printing Fulltext Access 4 Pages 2008
The effect of organic multi-layer periodic structure on carrier balance based on OLEDs Fulltext Access 4 Pages 2008
LC dependent electro-optical properties of holographic polymer dispersed liquid crystals Fulltext Access 5 Pages 2008
White organic light emitting devices with thin 4-(dicyanomethylene)-2-t-butyl-6(1,1,7,7-tetramethyljulolidyl-9-enyl)-4H-pyran (DCJTB) layer Fulltext Access 5 Pages 2008