Sciweavers

5544 search results - page 291 / 1109
» Three Inadequate Models
Sort
View
RE
2005
Springer
15 years 10 months ago
Modeling Security Requirements Through Ownership, Permission and Delegation
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
117
Voted
SIGCSE
2004
ACM
86views Education» more  SIGCSE 2004»
15 years 10 months ago
Research, teaching, and service: the miniconference as a model for CS graduate seminar courses
Rarely are the three pillars of academia—research, teaching, and service—addressed together, within one intellectually cohesive context in the graduate curriculum. Such a cont...
Paolo A. G. Sivilotti, Bruce W. Weide
119
Voted
ACRI
2004
Springer
15 years 10 months ago
Reconstructing Forest Savanna Dynamics in Africa Using a Cellular Automata Model, FORSAT
Large areas of savannas are found in Africa in climatic zones favourable to humid tropical forests: they are relicts of past dry periods and forest domains are naturally expanding....
Charly Favier, Marc A. Dubois
135
Voted
HICSS
2002
IEEE
172views Biometrics» more  HICSS 2002»
15 years 10 months ago
Collaborative Software Development: A Discussion of Problem Solving Models and Groupware Technologies
Teamwork is always challenging. Adding the complication of problem solving and software design only amplifies this challenge. The challenges of developing software as a team can b...
Joanna DeFranco-Tommarello, Fadi P. Deek
ICECCS
2002
IEEE
79views Hardware» more  ICECCS 2002»
15 years 10 months ago
A Framework for Performability Modeling of Messaging Services in Distributed Systems
Messaging services are a useful component in distributed systems that require scalable dissemination of messages (events) from suppliers to consumers. These services decouple supp...
Srinivasan Ramani, Katerina Goseva-Popstojanova, K...