Sciweavers

9210 search results - page 1586 / 1842
» Analyzing Real-Time Systems
Sort
View
107
Voted
HCI
2007
15 years 2 months ago
Incorporating User Centered Requirement Engineering into Agile Software Development
Agile Software Engineering approaches gain more and more popularity in today’s development organizations. The need for usable products is also a growing factor for organizations....
Markus Düchting, Dirk Zimmermann, Karsten Neb...
100
Voted
IIWAS
2008
15 years 2 months ago
A model-prover for constrained dynamic conversations
In a service-oriented architecture, systems communicate by exchanging messages. In this work, we propose a formal model based on OCL-constrained UML Class diagrams and a methodolo...
Diletta Cacciagrano, Flavio Corradini, Rosario Cul...
ICISC
2007
102views Cryptology» more  ICISC 2007»
15 years 2 months ago
Passive Attacks on a Class of Authentication Protocols for RFID
Abstract. Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent u...
Basel Alomair, Loukas Lazos, Radha Poovendran
53
Voted
LREC
2008
87views Education» more  LREC 2008»
15 years 2 months ago
Is this NE tagger getting old?
This paper focuses on the influence of changing the text time frame on the performance of a named entity tagger. We followed a twofold approach to investigate this subject: on the...
Cristina Mota, Ralph Grishman
MKWI
2008
188views Business» more  MKWI 2008»
15 years 2 months ago
A Pragmatic Approach to Traceability in Model-Driven Development
: A common problem in model-driven software development processes is the tracing of requirements across different phases of the software development life cycle iple levels of abstr...
Markus Aleksy, Tobias Hildenbrand, Claudia Obergfe...
« Prev « First page 1586 / 1842 Last » Next »