Sciweavers

4029 search results - page 203 / 806
» Experience with Software Watermarking
Sort
View
CGI
1999
IEEE
15 years 9 months ago
Virtual Laboratory: An Interactive Software Environment for Computer Graphics
Many activities in computer graphics can be regarded as experiments on virtual objects or models. In the process of experimentation the existing models are gradually improved and ...
Pavol Federl, Przemyslaw Prusinkiewicz
ICSE
1995
IEEE-ACM
15 years 8 months ago
Software Requirements Negotiation and Renegotiation Aids: A Theory-W Based Spiral Approach
A major problem in requirements engineering is obtaining requirements that address the concerns of multiple stakeholders. An approach to such a problem is the Theory-W based Spira...
Barry W. Boehm, Prasanta K. Bose, Ellis Horowitz, ...
157
Voted
DMS
2008
161views Multimedia» more  DMS 2008»
15 years 6 months ago
A Method to Diagnose Self-weaknesses for Software Development Organizations
A root cause is a source of a defect such that if it is removed, the defect is subsequently decreased or removed. By analyzing the root causes of defects of our software projects,...
Chi-Lu Yang, Yeim-Kuan Chang, Chih-Ping Chu
164
Voted
ICEB
2004
158views Business» more  ICEB 2004»
15 years 6 months ago
E-Business Adoption in Marketing and Its Relationship with Factors in SWOT Analysis: an Empirical Investigation of Small Softwar
This research gives empirically grounded insights into e-business adoption in conjunction with factors usually considered in SWOT (Strengths, Weaknesses, Opportunities, and Threat...
Edward Bernroider, Alexander Hampel
FMICS
2010
Springer
15 years 5 months ago
Correctness of Sensor Network Applications by Software Bounded Model Checking
We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior mode...
Frank Werner, David Faragó