Sciweavers

3555 search results - page 111 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
130
Voted
SAC
2009
ACM
15 years 10 months ago
Cross-organizational ERP management: how to create a successful business case?
This paper deals with the development and use of business cases in support of cross-organizational enterprise resource planning (ERP)-enabled e-business integration initiatives. I...
Silja Eckartz, Maya Daneva, Roel Wieringa, Jos van...
174
Voted
ICSM
2009
IEEE
15 years 10 months ago
Introducing a test suite similarity metric for event sequence-based test cases
Most of today’s event driven software (EDS) systems are tested using test cases that are carefully constructed as sequences of events; they test the execution of an event in the...
Penelope A. Brooks, Atif M. Memon
IJMMS
2006
84views more  IJMMS 2006»
15 years 3 months ago
Identity and role - A qualitative case study of cooperative scenario building
In this study, we argue that users participating in the design process will form the participation as a function of their professional role, but also as a function of their identi...
David Dinka, Jonas Lundberg
132
Voted
ICSEA
2009
IEEE
15 years 10 months ago
Testing of Image Processing Algorithms on Synthetic Data
—In this paper, it is shown that synthetic images can be used to test specific use cases of a lane tracking algorithm which has been developed by Audi AG. This was achieved by s...
Kilian von Neumann-Cosel, Erwin Roth, Daniel Lehma...
ASPDAC
2006
ACM
176views Hardware» more  ASPDAC 2006»
15 years 9 months ago
Conversion of reference C code to dataflow model: H.264 encoder case study
– Model-based design is widely accepted in developing complex embedded system under intense time-to-market pressure. While it promises improved design productivity, the main bott...
Hyeyoung Hwang, Taewook Oh, Hyunuk Jung, Soonhoi H...