Sciweavers

3926 search results - page 21 / 786
» Deriving Information Requirements from Responsibility Models
Sort
View
RE
2007
Springer
15 years 8 months ago
Improving Performance Requirements Specifications from Field Failure Reports
Customer-reported field failures provide valuable information for the requirements of the next release. Without a systematic approach, the requirements of the next release may not...
Chih-Wei Ho, Laurie Williams, Annie I. Antó...
SAC
2004
ACM
15 years 7 months ago
Information requirements engineering for data warehouse systems
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Based on interviews with projec...
Robert Winter, Bernhard Strauch
KDD
2006
ACM
145views Data Mining» more  KDD 2006»
16 years 2 months ago
Deriving quantitative models for correlation clusters
Correlation clustering aims at grouping the data set into correlation clusters such that the objects in the same cluster exhibit a certain density and are all associated to a comm...
Arthur Zimek, Christian Böhm, Elke Achtert, H...
128
Voted
SPLC
2008
15 years 3 months ago
An Exploratory Study of Information Retrieval Techniques in Domain Analysis
Domain analysis involves not only looking at standard requirements documents (e.g., use case specifications) but also at customer information packs, market analyses, etc. Looking ...
Vander Alves, Christa Schwanninger, Luciano Barbos...
117
Voted
IACR
2011
73views more  IACR 2011»
14 years 1 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr