Sciweavers

3555 search results - page 640 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
RE
2006
Springer
15 years 1 months ago
The Detection and Classification of Non-Functional Requirements with Application to Early Aspects
This paper introduces an information retrieval based approach for automating the detection and classification of non-functional requirements (NFRs). Early detection of NFRs is use...
Jane Cleland-Huang, Raffaella Settimi, Xuchang Zou...
APGV
2004
ACM
138views Visualization» more  APGV 2004»
15 years 6 months ago
Perceptual invariance of nonlinear Focus+Context transformations
Focus+Context techniques are commonly used in visualization systems to provide both the details and the context. The "shaker paradigm", in which an image is rapidly alte...
Keith Lau, Ronald A. Rensink, Tamara Munzner
SIGDOC
2003
ACM
15 years 6 months ago
Alternative methods for field usability research
Field usability research involves observing people in their own environments—for example, workplaces, homes, and schools—to learn their normal or natural behavior. Through fie...
Laurie Kantner, Deborah Hinderer Sova, Stephanie R...
ISCA
1991
IEEE
162views Hardware» more  ISCA 1991»
15 years 4 months ago
Comparison of Hardware and Software Cache Coherence Schemes
We use mean value analysis models to compare representative hardware and software cache coherence schemes for a large-scale shared-memory system. Our goal is to identify the workl...
Sarita V. Adve, Vikram S. Adve, Mark D. Hill, Mary...
LDTA
2010
15 years 1 months ago
Faster ambiguity detection by grammar filtering
Real programming languages are often defined using ambiguous context-free grammars. Some ambiguity is intentional while other ambiguity is accidental. A good grammar development e...
H. J. S. Basten, Jurgen J. Vinju