Abstract. This paper presents common weaknesses of requirements documents from commercial software projects that frequently cause problems in practice. Many documents contain exten...
Embedded systems have several characteristics, such as application specific needs, real-time constraints and intrinsic embedded concerns (i.e. energy consumption), which hinder th...
Edison Pignaton de Freitas, Marco A. Wehrmeister, ...
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
Undiscovered relationships in a data set may confound analyses, particularly those that assume data independence. Such problems occur when characters used for phylogenetic analyse...
Anne M. Maglia, Jennifer L. Leopold, Venkat Ram Gh...
The contemporary technological evolution requires higher levels of education and new skills from the work-force making people more conscious of the importance of being better educ...
Maria Helena Lima Baptista Braz, Sean W. M. Siquei...