Sciweavers

4048 search results - page 506 / 810
» Design Science, Engineering Science and Requirements Enginee...
Sort
View
ICSE
2004
IEEE-ACM
16 years 5 months ago
Architecting and Implementing Versatile Dependability
Distributed applications must often consider and select the appropriate trade-offs among three important aspects ? fault-tolerance, performance and resources. We introduce a novel ...
Tudor Dumitras, Deepti Srivastava, Priya Narasimha...
189
Voted
REALWSN
2010
14 years 11 months ago
Visibility Levels: Managing the Tradeoff between Visibility and Resource Consumption
Pre-deployment tests of sensor networks in indoor testbeds can only deliver a very approximate view of the correctness and performance of a deployed sensor network and it is theref...
Junyan Ma, Kay Römer
ICSE
2001
IEEE-ACM
15 years 9 months ago
Improving Software Inspections by Using Reading Techniques
Reading techniques are step-by-step procedures that guide individual inspectors while they uncover defects in a software artifact. Reading techniques provide a systematic and well...
Forrest Shull, Ioana Rus, Victor R. Basili
WACC
1999
ACM
15 years 9 months ago
SaveMe: a system for archiving electronic documents using messaging groupware
Today, organizations deal with an ever-increasing number of documents that have to be archived because they are either related to their core business (e.g., product designs) or ne...
Stefan Berchtold, Alexandros Biliris, Euthimios Pa...
120
Voted
ICAIL
2007
ACM
15 years 8 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...