Sciweavers

792 search results - page 104 / 159
» Interdisciplinary Design Research for End-User Software Engi...
Sort
View
ICSE
2005
IEEE-ACM
15 years 9 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
EMSOFT
2006
Springer
14 years 11 months ago
Reusable models for timing and liveness analysis of middleware for distributed real-time and embedded systems
Distributed real-time and embedded (DRE) systems have stringent constraints on timeliness and other properties whose assurance is crucial to correct system behavior. Formal tools ...
Venkita Subramonian, Christopher D. Gill, Cé...
EUROMICRO
2009
IEEE
15 years 4 months ago
Long-Term Planning of Development Efforts by Roadmapping
—Success in the software product business requires timely release of new products and upgrades with proper quality and the right features. For this, a systematic approach for man...
Jarno Vähäniitty, Casper Lassenius, Kris...
ITNG
2008
IEEE
15 years 4 months ago
Prototype Generation from Ontology Charts
Semantic Analysis is a business analysis method designed to capture user requirements and represent them as text or in a graph that is called Ontology Chart. Ontology Charts can b...
George Tsaramirsis, Iman Poernomo
AUIC
2006
IEEE
15 years 3 months ago
Persuasive interaction for collectivist cultures
Persuasive technology is defined as “any interactive product designed to change attitudes or behaviours by making desired outcomes easier to achieve”. It can take the form of...
Rilla Khaled, Robert Biddle, James Noble, Pippin B...