Sciweavers

165 search results - page 13 / 33
» A New Approach to Software Exploration: Back-Packing with GS...
Sort
View
ER
2009
Springer
130views Database» more  ER 2009»
14 years 1 months ago
Designing Law-Compliant Software Requirements
New laws, such as HIPAA and SOX, are increasingly impacting the design of software systems, as business organisations strive to comply. This paper studies the problem of generating...
Alberto Siena, John Mylopoulos, Anna Perini, Angel...
AUIC
2003
IEEE
14 years 21 days ago
Spreadsheet structure inspection using low level access and visualisation
Spreadsheets are an extremely common form of end-user programming used for many applications from student marks to accounting for global multinationals. Ways of studying the struc...
Daniel Ballinger, Robert Biddle, James Noble
CCS
2010
ACM
13 years 7 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
INTERACT
2003
13 years 8 months ago
Does an Individual's Myers-Briggs Type Indicator Preference Influence Task-Oriented Technology Use?
: Technology innovators face the challenge of finding representative groups of users to participate in design activities. In some cases, software applications will target an audien...
Pamela J. Ludford, Loren G. Terveen
JKM
2006
135views more  JKM 2006»
13 years 7 months ago
Learning from the Mars Rover Mission: scientific discovery, learning and memory
Purpose Knowledge management for space exploration is part of a multi-generational effort. Each mission builds on knowledge from prior missions, and learning is the first step in ...
Charlotte Linde