A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
In most real-time applications, deadlines are artifices that need to be enforced to meet different performance requirements. For example, in periodic task sets, jitter requiremen...
Hoai Hoang, Giorgio C. Buttazzo, Magnus Jonsson, S...
The investigation of a software system prior to a modification task often constitutes an important fraction of the overall effort associated with the task. We present Suade, an Ec...
Eye-tracking equipment is used to assess how well a subject comprehends UML class diagrams. The results of a study are presented in which eye movements are captured in a non-obtru...
Shehnaaz Yusuf, Huzefa H. Kagdi, Jonathan I. Malet...
Short Message Service (SMS) is a popular form of nonverbal mobile communication. To date, most research has focused upon the use of SMS by teenagers and young adults. Our work exa...
Christine Soriano, Gitesh K. Raikundalia, Jakub Sz...