Sciweavers

1015 search results - page 57 / 203
» Usability Engineering integrated with Requirements Engineeri...
Sort
View
CSCWD
2005
Springer
14 years 12 months ago
Analytic Evaluation of Groupware Design
We propose an analytic method to evaluate groupware design. The method was inspired by GOMS, a well-known approach to analyze usability problems with single-user interfaces. GOMS h...
Pedro Antunes, Marcos R. S. Borges, José A....
SIGSOFT
2002
ACM
15 years 10 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
OOPSLA
2000
Springer
15 years 1 months ago
Finding refactorings via change metrics
Reverse engineering is the process of uncovering the design and the design rationale from a functioning software system. Reverse engineering is an integral part of any successful ...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...
ADAEUROPE
1998
Springer
15 years 2 months ago
Automating the Ada Binding Process for Java- How Far Can We Go?
This paper describes an automated approach for generating Ada bindings from Java class files. We start with the set of Java features that require a visible Ada binding, and an Ada ...
David E. Emery, Robert F. Mathias, Karl A. Nyberg
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
15 years 4 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...