Abstract. This paper introduces a new method for safety analysis called HiPHOPS (Hierarchically Performed Hazard Origin and Propagation Studies). HiP-HOPS originates from a number ...
ÐThis paper discusses the notion of process inconsistency and suggests that inconsistencies in software processes are inevitable and sometimes desirable. We present an approach to...
Ian Sommerville, Gerald Kotonya, Stephen Viller, P...
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
In designing and developing large complex products, people use models to describe and organize interrelated elements in both product systems (architecture, use cases, constraints....
Xiao Jing, Pierre Pinel, Lei Pi, Vincent Aranega, ...
The Center for Technology in Government (CTG) in collaboration with SAP, the business software solutions provider to public sector organizations, conducted a research project focu...
Anthony M. Cresswell, Theresa A. Pardo, G. Brian B...