Sciweavers

37 search results - page 7 / 8
» Repeatable Quality Assurance Techniques for Requirements Neg...
Sort
View
BLISS
2007
IEEE
13 years 11 months ago
Evolving the Face of a Criminal: How to Search a Face Space More Effectively
Witnesses and victims of serious crime are often required to construct a facial composite, a visual likeness of a suspect’s face. The traditional method is for them to select in...
Charlie D. Frowd, Vicki Bruce, Carol Gannon, Mark ...
ICSE
1999
IEEE-ACM
13 years 9 months ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...
ADAEUROPE
2007
Springer
13 years 11 months ago
Towards the Testing of Power-Aware Software Applications for Wireless Sensor Networks
The testing of programs in wireless sensor networks (WSN) is an important means to assure quality but is a challenging process. As pervasive computing has been identified as a not...
W. K. Chan, Tsong Yueh Chen, S. C. Cheung, T. H. T...
SIGSOFT
2007
ACM
14 years 6 months ago
Training on errors experiment to detect fault-prone software modules by spam filter
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
Osamu Mizuno, Tohru Kikuno
APWEB
2005
Springer
13 years 11 months ago
PODWIS: A Personalized Tool for Ontology Development in Domain Specific Web Information System
Complex structure and varying requirements increase the difficulties in developing domain specific Web Information Systems. People appeal to a smart tool to customize Web Informati...
Lv-an Tang, Hongyan Li, Zhiyong Pan, Shaohua Tan, ...