Sciweavers

2669 search results - page 433 / 534
» Improvement of a configuration management system
Sort
View
SAFECOMP
1999
Springer
15 years 5 months ago
Hierarchically Performed Hazard Origin and Propagation Studies
Abstract. This paper introduces a new method for safety analysis called HiPHOPS (Hierarchically Performed Hazard Origin and Propagation Studies). HiP-HOPS originates from a number ...
Yiannis Papadopoulos, John A. McDermid
EWSPT
1995
Springer
15 years 5 months ago
Process Viewpoints
ÐThis paper discusses the notion of process inconsistency and suggests that inconsistencies in software processes are inevitable and sometimes desirable. We present an approach to...
Ian Sommerville, Gerald Kotonya, Stephen Viller, P...
123
Voted
FPLAY
2008
15 years 3 months ago
Lessons from Brain Age on password memorability
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Alain Forget, Sonia Chiasson, Robert Biddle
COMAD
2008
15 years 3 months ago
Modeling Uncertain and Imprecise Information in Process Modeling with UML
In designing and developing large complex products, people use models to describe and organize interrelated elements in both product systems (architecture, use cases, constraints....
Xiao Jing, Pierre Pinel, Lei Pi, Vincent Aranega, ...
DGO
2007
104views Education» more  DGO 2007»
15 years 3 months ago
Advancing return on investment analysis for government information technology
The Center for Technology in Government (CTG) in collaboration with SAP, the business software solutions provider to public sector organizations, conducted a research project focu...
Anthony M. Cresswell, Theresa A. Pardo, G. Brian B...