Sciweavers

86 search results - page 14 / 18
» Using Automatic Tools in Accessibility and Usability Assuran...
Sort
View
64
Voted
IWPC
2002
IEEE
15 years 2 months ago
Traceability Recovery in RAD Software Systems
This paper proposes an approach and a process to recover traceability links between source code and free text documents in software system developed with extensive use of COTS, mi...
Massimiliano Di Penta, Sara Gradara, Giuliano Anto...
ICSE
2007
IEEE-ACM
15 years 9 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...
FLAIRS
2003
14 years 11 months ago
Topic Extraction and Extension to Support Concept Mapping
Successful knowledge management may depend not only on knowledge capture, but on knowledge construction—on formulating new and useful knowledge that was not previously available...
David B. Leake, Ana Gabriela Maguitman, Thomas Rei...
ACSAC
2006
IEEE
15 years 3 months ago
Practical Attack Graph Generation for Network Defense
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
Kyle Ingols, Richard Lippmann, Keith Piwowarski
CSCW
2010
ACM
15 years 6 months ago
Catchup: a useful application of time-travel in meetings
People are often required to catch up on information they have missed in meetings, because of lateness or scheduling conflicts. Catching up is a complex cognitive process where pe...
Simon Tucker, Ofer Bergman, Anand Ramamoorthy, Ste...