Sciweavers

10908 search results - page 430 / 2182
» Requirements Engineering Tasks
Sort
View
CCS
2006
ACM
15 years 8 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
RTCSA
2006
IEEE
15 years 10 months ago
Computing the Minimum EDF Feasible Deadline in Periodic Systems
In most real-time applications, deadlines are artifices that need to be enforced to meet different performance requirements. For example, in periodic task sets, jitter requiremen...
Hoai Hoang, Giorgio C. Buttazzo, Magnus Jonsson, S...
ICSE
2007
IEEE-ACM
16 years 4 months ago
Suade: Topology-Based Searches for Software Investigation
The investigation of a software system prior to a modification task often constitutes an important fraction of the overall effort associated with the task. We present Suade, an Ec...
Frédéric Weigand Warr, Martin P. Rob...
IWPC
2007
IEEE
15 years 10 months ago
Assessing the Comprehension of UML Class Diagrams via Eye Tracking
Eye-tracking equipment is used to assess how well a subject comprehends UML class diagrams. The results of a study are presented in which eye movements are captured in a non-obtru...
Shehnaaz Yusuf, Huzefa H. Kagdi, Jonathan I. Malet...
AUIC
2006
IEEE
15 years 10 months ago
Middle-aged users' experience of short message service
Short Message Service (SMS) is a popular form of nonverbal mobile communication. To date, most research has focused upon the use of SMS by teenagers and young adults. Our work exa...
Christine Soriano, Gitesh K. Raikundalia, Jakub Sz...