Sciweavers

1001 search results - page 37 / 201
» Myths in Software Engineering: From the Other Side
Sort
View
RE
2001
Springer
15 years 4 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
SIGSOFT
2010
ACM
14 years 9 months ago
The future of research in free/open source software development
Free/Open Source Software (FOSS) development is not the same an Software Engineering (SE). Why this is so is unclear and open to various interpretations. Both address the challeng...
Walt Scacchi
SIGSOFT
2004
ACM
15 years 5 months ago
Engineering human trust in mobile system collaborations
Rapid advances in wireless networking technologies have enabled mobile devices to be connected anywhere and anytime. While roaming, applications on these devices dynamically disco...
Licia Capra
RE
2009
Springer
15 years 6 months ago
Trust Trade-off Analysis for Security Requirements Engineering
Abstract—Security requirements often have implicit assumptions about trust relationships among actors. The more actors trust each other, the less stringent the security requireme...
Golnaz Elahi, Eric S. K. Yu
UPP
2004
Springer
15 years 5 months ago
Overview of Generative Software Development
Abstract. System family engineering seeks to exploit the commonalities among systems from a given problem domain while managing the variabilities among them in a systematic way. In...
Krzysztof Czarnecki