Sciweavers

2518 search results - page 7 / 504
» Using Communication Objects During Requirements Analysis
Sort
View
RE
2004
Springer
15 years 2 months ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
MOBIHOC
2004
ACM
15 years 9 months ago
Rate allocation in wireless sensor networks with network lifetime requirement
An important performance consideration for wireless sensor networks is the amount of information collected by all the nodes in the network over the course of network lifetime. Sin...
Yiwei Thomas Hou, Yi Shi, Hanif D. Sherali
ICRE
2000
IEEE
15 years 1 months ago
Process Modeling for Object Oriented Analysis Using BORM Object Behavioral Analysis
BORM Object Behavior Analysis (BOBA) is a first stage in a process of object modeling which has proved successful in a wide number of applications. This paper discusses this metho...
Roger P. Knott, Vojtech Merunka, Jirí Pol&a...
WER
2000
Springer
15 years 1 months ago
Non-Functional Requirements for Object-Oriented Modeling
Recently, it has been pointed out that the majority of the requirements engineering methods do not take into account non-functional requirements (NFRs) [10][11]. Consequently, we h...
Jaime de Melo Sabat Neto, Julio Cesar Sampaio do P...
BMCBI
2007
166views more  BMCBI 2007»
14 years 9 months ago
How to decide which are the most pertinent overly-represented features during gene set enrichment analysis
Background: The search for enriched features has become widely used to characterize a set of genes or proteins. A key aspect of this technique is its ability to identify correlati...
Roland Barriot, David J. Sherman, Isabelle Dutour