48 papers:
- DAC-2015-ShererRO #functional #safety
- Ensuring functional safety compliance for ISO 26262 (ADS, JR, RO), p. 3.
- CBSE-2014-CidHMJ
- Ensuring application integrity in shared sensing environments (PJdC, DH, SM, WJ), pp. 149–158.
- FM-2014-ArenisWDMA #consistency #industrial #standard #verification
- The Wireless Fire Alarm System: Ensuring Conformance to Industrial Standards through Formal Verification (SFA, BW, DD, MM, ASA), pp. 658–672.
- ICEIS-v3-2014-DSouzaBHWV #assessment #framework #modelling #ontology
- An Assessment Framework for Business Model Ontologies to Ensure the Viability of Business Models (AD, NRTPvB, GBH, JCW, HV), pp. 226–235.
- SAC-2014-Mota #internet #quality #research #student
- Student research abstract: mechanisms to ensure quality of service for the internet of things (RPBM), pp. 713–714.
- EDOC-2013-NagelGEP #consistency #modelling #process
- Ensuring Consistency among Business Goals and Business Process Models (BN, CG, GE, JP), pp. 17–26.
- CBSE-2012-GhafariJSH #approach #architecture #component #configuration management #consistency
- An architectural approach to ensure globally consistent dynamic reconfiguration of component-based systems (MG, PJ, SS, HH), pp. 177–182.
- ICPR-2012-DasR #documentation #image #novel #quality
- A novel scheme of orientation and scale mapped RDC (OS-RDC) to improve compression in document images ensuring quality preservation (AD, RR), pp. 641–644.
- SAC-2012-RahmanA #authentication #named #network #protocol #robust
- DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks (FR, SIA), pp. 498–503.
- DATE-2011-NarayananZT #correctness #pattern matching #process #using
- Ensuring correctness of analog circuits in presence of noise and process variations using pattern matching (RN, MHZ, ST), pp. 1188–1191.
- DUXU-v2-2011-BaughD #design #experience #locality #user interface
- Designing Notebook Computers to Ensure a Comfortable User Experience: Effects of Surface Temperature, Material, Locality, and Ambient Temperature (EB, RD), pp. 539–547.
- DUXU-v2-2011-OlsenPB #effectiveness #game studies #how #testing #usability
- Serious Games Usability Testing: How to Ensure Proper Usability, Playability, and Effectiveness (TO, KP, CAB), pp. 625–634.
- HIMI-v1-2011-Terawaki #education #elicitation #information management #requirements
- Supporting of Requirements Elicitation for Ensuring Services of Information Systems Used for Education (YT), pp. 58–65.
- SEKE-2011-AlencarTSDC
- Maximizing the Financial Benefits Yielded by IT Projects While Ensuring their Strategic Fit (AJA, GT, EAS, AFdSD, ALC), pp. 288–295.
- SEKE-2011-ComanSS
- Ensuring Continuous Data Accuracy in AISEMA Systems (IDC, AS, GS), pp. 640–645.
- ASPLOS-2011-HofmannDKRW #kernel #operating system
- Ensuring operating system kernel integrity with OSck (OSH, AMD, SK, IR, EW), pp. 279–290.
- SCAM-2010-SimpsonB #c #memory management #named #runtime #safety
- MemSafe: Ensuring the Spatial and Temporal Memory Safety of C at Runtime (MSS, RB), pp. 199–208.
- SAC-2010-CostaMB #consistency #database #distributed #mobile #protocol
- A distributed protocol for ensuring replicated database consistency in mobile computing environments (AC, JMM, AB), pp. 1688–1693.
- CBSE-2009-KiniryF #consistency #design #documentation #implementation #specification
- Ensuring Consistency between Designs, Documentation, Formal Specifications, and Implementations (JRK, FF), pp. 242–261.
- WICSA-ECSA-2009-NallurBY #architecture #in the cloud #quality #self
- Self-optimizing architecture for ensuring Quality Attributes in the cloud (VN, RB, XY), pp. 281–284.
- FASE-2009-HermannEE #graph #inheritance #network #security
- Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks (FH, HE, CE), pp. 325–339.
- HCD-2009-NakanoR #analysis #corpus #multimodal #usability
- Multimodal Corpus Analysis as a Method for Ensuring Cultural Usability of Embodied Conversational Agents (YIN, MR), pp. 521–530.
- ESEC-FSE-2009-DenaroPT #self
- Ensuring interoperable service-oriented systems through engineered self-healing (GD, MP, DT), pp. 253–262.
- ASPLOS-2009-RajamaniRRV #named #source code
- ISOLATOR: dynamically ensuring isolation in comcurrent programs (SKR, GR, VPR, KV), pp. 181–192.
- WICSA-2008-RadjenovicP #architecture #consistency #dependence
- The Role of Dependency Links in Ensuring Architectural View Consistency (AR, RFP), pp. 199–208.
- ICPC-2008-FeilkasR #api #constraints
- Ensuring Well-Behaved Usage of APIs through Syntactic Constraints (MF, DR), pp. 248–253.
- CAiSE-2008-WangGV #reliability #transaction
- Ensuring Transactional Reliability by E-Contracting (TW, PWPJG, JV), pp. 262–265.
- ASE-2007-FischerM #consistency #transaction
- Ensuring consistency in long running transactions (JF, RM), pp. 54–63.
- FASE-2007-RangerH #consistency #distributed #graph transformation
- Ensuring Consistency Within Distributed Graph Transformation Systems (UR, TH), pp. 368–382.
- PEPM-2007-Vidal #logic programming #partial evaluation #source code #termination
- Quasi-terminating logic programs for ensuring the termination of partial evaluation (GV), pp. 51–60.
- GT-VMT-2007-KohlerLT #constraints #graph #model transformation
- Ensuring Containment Constraints in Graph-based Model Transformation Approaches (CK, HL, GT).
- DAC-2006-GoffioulVDDC #consistency #design #object-oriented #using
- Ensuring consistency during front-end design using an object-oriented interfacing tool called NETLISP (MG, GV, JVD, BD, BC), pp. 889–892.
- DATE-2006-Kundu #analysis #design
- A design for failure analysis (DFFA) technique to ensure incorruptible signatures (SK), pp. 309–310.
- SEKE-2006-PauliX #case study #composition #consistency
- Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems (JJP, DX), pp. 392–397.
- HPDC-2006-FrommerH #grid #quality
- Ensuring numerical quality in grid computing (AF, MH), pp. 335–336.
- FASE-2005-TaentzerR #constraints #graph #inheritance #modelling
- Ensuring Structural Constraints in Graph-Based Models with Type Inheritance (GT, AR), pp. 64–79.
- FSE-2004-XuDS #c #memory management #performance #safety #source code
- An efficient and backwards-compatible transformation to ensure memory safety of C programs (WX, DCD, RS), pp. 117–126.
- ITiCSE-2003-BarrosEDPS #programming #using
- Using lab exams to ensure programming practice in an introductory programming course (JPB, LE, RD, RP, ES), pp. 16–20.
- ICEIS-2002-CheungCD #design #process #standard
- Supporting Engineering Design Process with an Intelligent Compliance Agent: A Way to Ensure a Standard Complied Process (LYCC, PWHC, RD), pp. 341–349.
- CBSE-2001-Wile #architecture #using
- Ensuring General-Purpose and Domain-Specific Properties Using Architectural Styles (DSW), p. 6.
- CSCW-2000-GodefroidyHJL #approach #automation #privacy #verification
- Ensuring privacy in presence awareness: an automated verification approach (PG, JDH, LJJ, DL), pp. 59–68.
- UML-2000-CasanovaWD #ocl #quality #uml
- Ensuring Quality of Geographic Data with UML and OCL (MC, TW, MD), pp. 225–239.
- LOPSTR-1999-DucasseR #consistency #formal method #proving
- Proof Obligations of the B Formal Method: Local Proofs Ensure Global Consistency (MD, LR), pp. 10–29.
- ICLP-1995-MartensG #deduction #flexibility #termination
- Ensuring Global Termination of Partial Deduction while Allowing Flexible Polyvariance (BM, JPG), pp. 597–611.
- SIGMOD-1994-ZhangNBB #flexibility #multi #transaction
- Ensuring Relaxed Atomicity for Flexible Transactions in Multidatabase Systems (AZ, MHN, BKB, OAB), pp. 67–78.
- PODS-1992-MehrotraRBKS #multi #transaction
- Ensuring Transaction Atomicity in Multidatabase Systems (SM, RR, YB, HFK, AS), pp. 164–175.
- PLILP-1990-BoeckC #analysis #correctness #prolog #static typing
- Static Type Analysis of Prolog Procedures for Ensuring Correctness (PDB, BLC), pp. 222–237.
- ICSE-1985-MinskyL
- Ensuring Integrity by Adding Obligations to Privileges (NHM, AL), pp. 92–102.