Sciweavers

142 search results - page 16 / 29
» Enhancing a Requirements Baseline with Scenarios
Sort
View
PODS
2005
ACM
96views Database» more  PODS 2005»
15 years 12 months ago
Privacy-enhancing k-anonymization of customer data
In order to protect individuals' privacy, the technique of kanonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. In this p...
Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright
AUTOMOTIVEUI
2009
ACM
15 years 6 months ago
On timing and modality choice with local danger warnings for drivers
We present an experimental study on the effectiveness of five modality variants (speech, text-only, icon-only, two combinations of text and icons) for presenting local danger wa...
Yujia Cao, Sandro Castronovo, Angela Mahr, Christi...
KBSE
2005
IEEE
15 years 5 months ago
On dynamic feature location
Feature location aims at locating pieces of code that implement a given set of features (requirements). It is a necessary first step in every program comprehension and maintenanc...
Rainer Koschke, Jochen Quante
ENTCS
2007
104views more  ENTCS 2007»
14 years 11 months ago
A Formal Framework for Web Services Coordination
Recently the term Web Services choreography has been introduced to address some issues related to Web Services composition and coordination. Several proposals for describing chore...
Claudio Guidi, Roberto Lucchi, Manuel Mazzara
WEBI
2010
Springer
14 years 9 months ago
Incorporating Seasonality into Search Suggestions Derived from Intranet Query Logs
While much research has been performed on query logs collected for major Web search engines, query log analysis to enhance search on smaller and more focused collections has attrac...
Stephen Dignum, Udo Kruschwitz, Maria Fasli, Yunhy...