Sciweavers

1976 search results - page 167 / 396
» Application Semiotics Engineering Process
Sort
View
138
Voted
CHI
2005
ACM
16 years 4 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
158
Voted
ADAEUROPE
2007
Springer
15 years 10 months ago
Correctness by Construction for High-Integrity Real-Time Systems: A Metamodel-Driven Approach
Current trends in software engineering promote the contention that the use of model-driven approaches should prove as beneficial to high-integrity systems as they have to business ...
Matteo Bordin, Tullio Vardanega
QSIC
2005
IEEE
15 years 9 months ago
A Preliminary Evaluation of Software Inspection Tools, with the DESMET Method
Software inspections are established means of ensuring quality in software engineering. The traditional paper-based inspections are considered too laborious for widespread usage, ...
Henrik Hedberg, Jouni Lappalainen
EWSA
2005
Springer
15 years 9 months ago
On the Systematic Conformance Check of Software Artefacts
Abstract. In this paper we present a systematic check of the conformance of the implemented and the intended software architecture. Nowadays industry is confronted with rapidly evo...
Hylke W. van Dijk, Bas Graaf, Rob Boerman
RE
2004
Springer
15 years 9 months ago
Understanding Requirements in Enterprise Systems Projects
Due to the generality and complexity of enterprise systems, they are challenging to implement and deploy successfully in organizations. Many of these problems are rooted in the wa...
Jon Atle Gulla