Sciweavers

580 search results - page 18 / 116
» A Requirements Elicitation Approach Based in Templates and P...
Sort
View
EDOC
2004
IEEE
13 years 11 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
EUROMICRO
2007
IEEE
13 years 11 months ago
Guiding Component-Based Hardware/Software Co-Verification with Patterns
In component-based hardware/software co-verification, properties of an embedded system are established from properties of its hardware and software components. A major challenge i...
Juncao Li, Fei Xie, Huaiyu Liu
AOSD
2003
ACM
14 years 1 months ago
Modularisation and composition of aspectual requirements
An effective requirements engineering (RE) approach must harmonise the need to achieve separation of concerns with the need to satisfy broadly scoped requirements and constraints....
Awais Rashid, Ana M. D. Moreira, João Ara&u...
GECCO
2009
Springer
14 years 16 days ago
Search based data sensitivity analysis applied to requirement engineering
Software engineering is plagued by problems associated with unreliable cost estimates. This paper introduces an approach to sensitivity analysis for requirements engineering. It u...
Mark Harman, Jens Krinke, Jian Ren, Shin Yoo
KDD
2007
ACM
193views Data Mining» more  KDD 2007»
14 years 8 months ago
Joint optimization of wrapper generation and template detection
Many websites have large collections of pages generated dynamically from an underlying structured source like a database. The data of a category are typically encoded into similar...
Shuyi Zheng, Ruihua Song, Ji-Rong Wen, Di Wu