Sciweavers

237 search results - page 4 / 48
» Adaptive Systems Require Adaptive Support--When Tools Attack...
Sort
View
RE
2010
Springer
13 years 2 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
RE
2005
Springer
14 years 1 months ago
The Role of Deferred Requirements in a Longitudinal Study of Emailing
Our group has taken a clinical approach to doing requirements engineering for a specific domain: delivering email tools to the cognitively impaired population. The clinical view s...
Stephen Fickas, William N. Robinson, McKay Moore S...
LCTRTS
2001
Springer
14 years 1 days ago
Middleware For Building Adaptive Systems Via Configuration
1 COTS (commercial off-the-shelf) devices are capable of executing powerful, distributed algorithms. Very large, adaptive systems can be created by simply integrating these devices...
Sanjai Narain, Ravichander Vaidyanathan, Stanley M...
IJCNN
2000
IEEE
14 years 2 hour ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
ICSE
1998
IEEE-ACM
13 years 11 months ago
An Adaptable Generation Approach to Agenda Management
As software engineering efforts move to more complex, distributed environments, coordinating the activities of people and tools becomes very important. While groupware systems add...
Eric K. McCall, Lori A. Clarke, Leon J. Osterweil