Sciweavers

729 search results - page 49 / 146
» Supporting Use-Case Reviews
Sort
View
COMPSAC
2006
IEEE
15 years 6 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
UIST
2006
ACM
15 years 6 months ago
Videotater: an approach for pen-based digital video segmentation and tagging
The continuous growth of media databases necessitates development of novel visualization and interaction techniques to support management of these collections. We present Videotat...
Nicholas Diakopoulos, Irfan A. Essa
LAWEB
2003
IEEE
15 years 5 months ago
Collaborative Learning and Creative Writing
CSCL software tools must provide support for group work and should be based on a collaborative learning technique. The PBL based CCCuento tool is introduced here. It is intended t...
Luis A. Guerrero, Boris Mejías, Césa...
HICSS
2002
IEEE
91views Biometrics» more  HICSS 2002»
15 years 5 months ago
The Planet Method for Designing Relationships in B2B E-commerce
Business to Business (B2B) relationships in Ecommerce are becoming increasingly important. However, there is little guidance available for managers about how relationships should ...
Alistair G. Sutcliffe, Norma Lammont
HICSS
1999
IEEE
96views Biometrics» more  HICSS 1999»
15 years 4 months ago
Distributed Research Teams: Meeting Asynchronously in Virtual Space
As computer networks improve, more social and work interactions are carried out "virtually" by geographically separated group members. In this paper we discuss the desig...
Lia Adams, Lori Toomey, Elizabeth F. Churchill