Sciweavers

1039 search results - page 96 / 208
» Methods as knowledge enablers in software development organi...
Sort
View
WER
2005
Springer
15 years 3 months ago
Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce
This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method in...
Simara Vieira da Rocha, Zair Abdelouahab, Eduardo ...
DGO
2011
237views Education» more  DGO 2011»
13 years 9 months ago
Modeling digital preservation capabilities in enterprise architecture
The rising awareness of the challenges of preserving information over the long term has led to a wealth of initiatives developing economic models, methods, tools, systems, guideli...
Christoph Becker, Gonçalo Antunes, Jos&eacu...
ICSE
2007
IEEE-ACM
15 years 10 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
CSB
2004
IEEE
131views Bioinformatics» more  CSB 2004»
15 years 1 months ago
Improved Fourier Transform Method for Unsupervised Cell-Cycle Regulated Gene Prediction
Motivation: Cell-cycle regulated gene prediction using microarray time-course measurements of the mRNA expression levels of genes has been used by several researchers. The popular...
Karuturi R. Krishna Murthy, Liu Jian Hua
ICSE
2001
IEEE-ACM
15 years 2 months ago
Supporting Program Comprehension Using Semantic and Structural Information
The paper focuses on investigating the combined use of semantic and structural information of programs to support the comprehension tasks involved in the maintenance and reenginee...
Jonathan I. Maletic, Andrian Marcus