Sciweavers

617 search results - page 97 / 124
» A unified language processing methodology
Sort
View
ACSAC
2002
IEEE
15 years 2 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
WWW
2006
ACM
15 years 10 months ago
Relaxed: on the way towards true validation of compound documents
To maintain interoperability in the Web environment it is necessary to comply with Web standards. Current specifications of HTML and XHTML languages define conformance conditions ...
Jirka Kosek, Petr Nálevka
ICSE
2005
IEEE-ACM
15 years 9 months ago
Clinical requirements engineering
In this paper, I make a case for integration of requirements engineering (RE) with clinical disciplines. To back my case, I look at two examples that employ a clinical RE approach...
Stephen Fickas
MODELLIERUNG
2001
14 years 11 months ago
Dependency Charts as a Means to Model Inter-Scenario Dependencies
: Scenarios/use cases have gained wide-spread use over the last couple of years. In software engineering they are mainly used to capture requirements and specify a system. Many sof...
Johannes Ryser, Martin Glinz
SPE
2002
105views more  SPE 2002»
14 years 9 months ago
Specifying a role-based guide for learning to work with an enterprise framework
Learning to work with enterprise frameworks requires considerable effort, because of the inherent complexity of all the knowledge that is needed. However, different roles in proje...
Wilhelm Hasselbring, Ralph van den Houdt