Sciweavers

2342 search results - page 267 / 469
» A Methodology for Evaluating Software Engineering Methods an...
Sort
View
SIGSOFT
2008
ACM
16 years 4 months ago
Semi-automating small-scale source code reuse via structural correspondence
Developers perform small-scale reuse tasks to save time and to increase the quality of their code, but due to their small scale, the costs of such tasks can quickly outweigh their...
Rylan Cottrell, Robert J. Walker, Jörg Denzin...
RE
2006
Springer
15 years 4 months ago
Using Domain Ontology as Domain Knowledge for Requirements Elicitation
Domain knowledge is one of crucial factors to get a great success in requirements elicitation of high quality, and only domain experts, not requirements analysts, have it. We prop...
Haruhiko Kaiya, Motoshi Saeki
BMCBI
2008
118views more  BMCBI 2008»
15 years 4 months ago
Evaluation of phylogenetic footprint discovery for predicting bacterial cis-regulatory elements and revealing their evolution
Background: The detection of conserved motifs in promoters of orthologous genes (phylogenetic footprints) has become a common strategy to predict cis-acting regulatory elements. S...
Rekin's Janky, Jacques van Helden
CHI
2007
ACM
16 years 4 months ago
What happened to remote usability testing?: an empirical study of three methods
The idea of conducting usability tests remotely emerged ten years ago. Since then, it has been studied empirically, and some software organizations employ remote methods. Yet ther...
Henrik Villemann Nielsen, Jan Stage, Morten Sieker...
ICSE
2008
IEEE-ACM
16 years 4 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens