Sciweavers

2429 search results - page 372 / 486
» A Requirement Engineering Approach to User Centered Design
Sort
View
ISPASS
2006
IEEE
15 years 10 months ago
Workload sanitation for performance evaluation
The performance of computer systems depends, among other things, on the workload. Performance evaluations are therefore often done using logs of workloads on current productions s...
Dror G. Feitelson, Dan Tsafrir
IUI
2006
ACM
15 years 10 months ago
An intelligent discussion-bot for answering student queries in threaded discussions
This paper describes a discussion-bot that provides answers to students’ discussion board questions in an unobtrusive and humanlike way. Using information retrieval and natural ...
Donghui Feng, Erin Shaw, Jihie Kim, Eduard H. Hovy
AVI
2008
15 years 6 months ago
Timeline trees: visualizing sequences of transactions in information hierarchies
In many applications transactions between the elements of an information hierarchy occur over time. For example, the product offers of a department store can be organized into pro...
Michael Burch, Fabian Beck, Stephan Diehl
ICSM
2008
IEEE
15 years 11 months ago
Software visualization with audio supported cognitive glyphs
There exist numerous software visualization techniques that aim to facilitate program comprehension. One of the main concerns in every such software visualization is to identify r...
Sandro Boccuzzo, Harald Gall
COMPSAC
2007
IEEE
15 years 8 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie