We elaborate a proposal for capturing, extending, and reusing design knowledge gleaned through usability testing. The proposal is specifically targeted to address interface design...
Christa M. Chewar, D. Scott McCrickard, Alistair G...
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
Source code investigation is one of the most time consuming activities during software maintenance and evolution, yet currently available tool support suffers from several shortco...
Schemas evolve over time to accommodate the changes in the information they represent. Such evolution causes invalidation of various artifacts depending on the schemas, such as sc...
Drawing on a fieldwork study, this paper considers different design options for the development of a system for facilitating distributed organisation and distributed working withi...