Sciweavers

328 search results - page 29 / 66
» Requirements Inheritance in Continuous Requirements Engineer...
Sort
View
88
Voted
APCCM
2009
15 years 9 hour ago
Conceptual Application Domain Modelling
Application domain description precedes requirements engineering, and is the basis for the development of a software or information system that satisfies all expectations of its u...
Bernhard Thalheim, Klaus-Dieter Schewe, Hui Ma
MOBISYS
2007
ACM
15 years 10 months ago
Accelerometer-based human abnormal movement detection in wireless sensor networks
Wireless sensor networks have become increasingly common in everyday applications due to decreasing technology costs and improved product reliability. An ideal application for wire...
T. Ryan Burchfield, S. Venkatesan
COMPSAC
2001
IEEE
15 years 2 months ago
Designing Role Hierarchies for Access Control in Workflow Systems
he correspondence between the role abstraction in Role-based Access Control (RBAC) and the notion of organizational positions, it seems easy to construct role hierarchies. This is...
Reinhardt A. Botha, Jan H. P. Eloff
72
Voted
CHI
2006
ACM
15 years 11 months ago
Direct pointer: direct manipulation for large-display interaction using handheld cameras
This paper describes the design and evaluation of a technique, Direct Pointer, that enables users to interact intuitively with large displays using cameras equipped on handheld de...
Hao Jiang, Eyal Ofek, Neema Moraveji, Yuanchun Shi
CISS
2008
IEEE
15 years 5 months ago
The Chinese Generals Problem
Abstract—To achieve higher reliability, safety, and faulttolerance, many mission-critical detection and decision systems implement consensus algorithms that force the systems’ ...
Edwin Soedarmadji