Sciweavers

1015 search results - page 150 / 203
» Usability Engineering integrated with Requirements Engineeri...
Sort
View
IFIPTM
2009
119views Management» more  IFIPTM 2009»
14 years 7 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
HICSS
2011
IEEE
252views Biometrics» more  HICSS 2011»
14 years 1 months ago
Hitting the Wall: What to Do When High Performing Scrum Teams Overwhelm Operations and Infrastructure
All-at-once Scrum implementations require total commitment to change, high level management support and aggressive removal of impediments. Several company-wide implementations are...
Jeff Sutherland, Robert Frohman
SIGSOFT
2006
ACM
15 years 10 months ago
Dynamic slicing long running programs through execution fast forwarding
Fixing runtime bugs in long running programs using trace based analyses such as dynamic slicing was believed to be prohibitively expensive. In this paper, we present a novel execu...
Xiangyu Zhang, Sriraman Tallam, Rajiv Gupta
WWW
2007
ACM
15 years 10 months ago
Semi-automated adaptation of service interactions
In today's Web, many functionality-wise similar Web services are offered through heterogeneous interfaces (operation definitions) and business protocols (ordering constraints...
Hamid R. Motahari Nezhad, Boualem Benatallah, Axel...
AADEBUG
2005
Springer
15 years 3 months ago
Tdb: a source-level debugger for dynamically translated programs
Debugging techniques have evolved over the years in response to changes in programming languages, implementation techniques, and user needs. A new type of implementation vehicle f...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa