Sciweavers

1014 search results - page 138 / 203
» The Business Case of HCI
Sort
View
COMPSAC
2008
IEEE
15 years 6 months ago
Transformation of Legacy Software into Client/Server Applications through Pattern-Based Rearchitecturing
In this article, we address the problem of modularizing legacy applications with monolithic structure, primarily focusing on business software written in an objectoriented program...
Sascha Hunold, Matthias Korch, Björn Krellner...
WISE
2008
Springer
15 years 6 months ago
Mobile Payment: Towards a Customer-Centric Model
Abstract. Mobile payment normally occurs as a wireless transaction of monetary value and includes the initiation, authorization and the realization of the payment. Such transaction...
Krassie Petrova
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 6 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
HICSS
2007
IEEE
103views Biometrics» more  HICSS 2007»
15 years 6 months ago
Understanding Context through a Comprehensive Prototyping Experience: A Testbed Research Strategy for Emerging Technologies
Information and Communication Technologies (ICTs) are rapidly changing and new technologies, processes, and skills are constantly emerging. An important challenge for the research...
José Ramón Gil-García, Theres...
IEEESCC
2007
IEEE
15 years 6 months ago
Design Principles for B2B Services - An Evaluation of Two Alternative Service Designs
A service-oriented architecture (SOA) promises a more flexible intra- and interorganizational integration of heterogeneous application systems. The central design element of a SOA...
Christine Legner, Tobias Vogel