Sciweavers

3555 search results - page 64 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
15 years 6 months ago
Coordination analysis: a method for deriving use cases from process dependencies
Despite the widespread recognition that information technology (IT) and business process are tightly connected, existing system design methods provide limited guidance on how to t...
Xiang Michelle Liu, George M. Wyner
ESEM
2009
ACM
15 years 8 months ago
The evolution and impact of code smells: A case study of two open source systems
Code smells are design flaws in object-oriented designs that may lead to maintainability issues in the further evolution of the software system. This study focuses on the evolutio...
Steffen Olbrich, Daniela Cruzes, Victor R. Basili,...
SEKE
2004
Springer
15 years 6 months ago
Applying Aspect-Orientation in Designing Security Systems: A Case Study
As a security policy model evolves, the design of security systems using that model could become increasingly complicated. It is necessary to come up with an approach to guide the ...
Shu Gao, Yi Deng, Huiqun Yu, Xudong He, Konstantin...
ECIS
2004
15 years 2 months ago
The implementation and use of conceptual standards - the case of the rds-tmc service
The topic of the paper concerns the implementation and use of standards. The standards which are in focus in the paper include conceptual models and descriptions of the functionali...
Owen Eriksson, Anders Forsman
77
Voted
WSC
2007
15 years 3 months ago
Agent-model validation based on historical data
Combat, unlike many real-world processes, tends to be singular in nature. That is, there are not multiple occurrences from which to hypothesize a probability distribution model of...
Lance E. Champagne, Raymond R. Hill