Sciweavers

3555 search results - page 111 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
SAC
2009
ACM
15 years 8 months ago
Cross-organizational ERP management: how to create a successful business case?
This paper deals with the development and use of business cases in support of cross-organizational enterprise resource planning (ERP)-enabled e-business integration initiatives. I...
Silja Eckartz, Maya Daneva, Roel Wieringa, Jos van...
ICSM
2009
IEEE
15 years 8 months ago
Introducing a test suite similarity metric for event sequence-based test cases
Most of today’s event driven software (EDS) systems are tested using test cases that are carefully constructed as sequences of events; they test the execution of an event in the...
Penelope A. Brooks, Atif M. Memon
122
Voted
IJMMS
2006
84views more  IJMMS 2006»
15 years 1 months ago
Identity and role - A qualitative case study of cooperative scenario building
In this study, we argue that users participating in the design process will form the participation as a function of their professional role, but also as a function of their identi...
David Dinka, Jonas Lundberg
ICSEA
2009
IEEE
15 years 8 months ago
Testing of Image Processing Algorithms on Synthetic Data
—In this paper, it is shown that synthetic images can be used to test specific use cases of a lane tracking algorithm which has been developed by Audi AG. This was achieved by s...
Kilian von Neumann-Cosel, Erwin Roth, Daniel Lehma...
ASPDAC
2006
ACM
176views Hardware» more  ASPDAC 2006»
15 years 7 months ago
Conversion of reference C code to dataflow model: H.264 encoder case study
– Model-based design is widely accepted in developing complex embedded system under intense time-to-market pressure. While it promises improved design productivity, the main bott...
Hyeyoung Hwang, Taewook Oh, Hyunuk Jung, Soonhoi H...