Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
g higher levels of abstraction with automated downward transformations has always been the way to go, as long as the engineers who do the actual work are th the abstractions. A dev...
ACTION THE KEY TO COMPUTING? Why is it that some software engineers and computer scientists are able to produce clear, elegant designs and programs, while others cannot? Is it poss...
This paper investigates CSCW aspects of large-scale technical projects based on a case study of a specific Danish engineering company and uncovers challenges to CSCW applications ...
This paper is concerned with the mathematics and formal specification of "set-like" operations for the mixed dimension cellular objects of the Djinn Application Programm...
Alan E. Middleditch, Chris Reade, Abel J. P. Gomes