Sciweavers

3555 search results - page 26 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CIKM
1997
Springer
15 years 5 months ago
A Framework for the Management of Past Experiences with Time-Extended Situations
: In the context of knowledge management, we focus on the representation and the retrieval of past experiences called cases within the Case-Based Reasoning (CBR) paradigm. CBR is a...
Michel Jaczynski
HICSS
2008
IEEE
132views Biometrics» more  HICSS 2008»
15 years 7 months ago
Support of Case-Based Authentic Learning Activities: A Collaborative Case Commenting Tool and a Collaborative Case Builder
Cases are widely used in professional education to engage learners with examples of real world practices. Collaboration in casebased learning can add to the authenticity of the ex...
Lu Xiao, John M. Carroll, Pat Clemson, Mary Beth R...
CASES
2003
ACM
15 years 6 months ago
Extending STI for demanding hard-real-time systems
Software thread integration (STI) is a compilation technique which enables the efficient use of an application’s fine-grain idle time on generic processors without special hardw...
Benjamin J. Welch, Shobhit O. Kanaujia, Adarsh See...
BCS
2008
15 years 2 months ago
Developing Knowledge-Based Systems using the Semantic Web
The benefits of reuse have long been recognized in the knowledge engineering community where the dream of creating knowledge-based systems on-the-fly from libraries of reusable co...
David Corsar, Derek H. Sleeman
IEEESP
2006
108views more  IEEESP 2006»
15 years 1 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven