Sciweavers

662 search results - page 82 / 133
» Involving End Users in Distributed Requirements Engineering
Sort
View
LOGCOM
2010
154views more  LOGCOM 2010»
14 years 4 months ago
Collaborative Runtime Verification with Tracematches
Perfect pre-deployment test coverage is notoriously difficult to achieve for large applications. Given enough end users, however, many more test cases will be encountered during a...
Eric Bodden, Laurie J. Hendren, Patrick Lam, Ondre...
IV
2008
IEEE
99views Visualization» more  IV 2008»
15 years 4 months ago
Visualization Enhanced Semantic Wikis for Patent Information
In this paper we present a new approach for using semantic wikis for collaborative patent search and annotation. We describe an extension that allows integrating interactive visua...
Mark Giereth, Thomas Ertl
ENTCS
2008
130views more  ENTCS 2008»
14 years 9 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
INFOCOM
2009
IEEE
15 years 4 months ago
FS2You: Peer-Assisted Semi-Persistent Online Storage at a Large Scale
—It has been widely acknowledged that online storage systems within the “cloud” of the Internet provide services of a substantial value to end users who wish to share files ...
Ye Sun, Fangming Liu, Bo Li, Baochun Li, Xinyan Zh...
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
15 years 1 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni