Sciweavers

1268 search results - page 82 / 254
» High Impact Requirements Engineering
Sort
View
COMPSAC
2008
IEEE
15 years 8 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu
CSMR
2000
IEEE
15 years 5 months ago
A Proposal for Supporting Software Evolution in Componentware
In practice, a pure top-down and refinement-based development process is not applicable. A more iterative and incremental approach is usually applied with respect to changing req...
Andreas Rausch
WOSP
2010
ACM
15 years 5 months ago
A framework for utility-based service oriented design in SASSY
The architecture of a software system has a significant impact on its quality of service (QoS) as measured by several performance metrics such as execution time, availability, th...
Daniel A. Menascé, John M. Ewing, Hassan Go...
RE
2008
Springer
15 years 27 days ago
Sensitivity analysis in the process of COTS mismatch-handling
Abstract During the selection of commercial off-theshelf (COTS) products, mismatches encountered between stakeholders' requirements and features offered by COTS products are i...
Abdallah Mohamed, Günther Ruhe, Armin Eberlei...
METRICS
2003
IEEE
15 years 6 months ago
Estimating the Design Effort of Web Applications
Our study focuses on the effort needed for designing Web applications. The effort required for the design phase is an important part of the total development effort of a Web appli...
Luciano Baresi, Sandro Morasca, Paolo Paolini