Sciweavers

2384 search results - page 335 / 477
» Analyzing Requirements Engineering Processes: A Case Study
Sort
View
SERP
2010
15 years 2 months ago
The Viability of UML Models in Small Web Applications
As the use of online business systems increase so does the need to produce more efficient and less error prone web based Modeling is a core abstraction mechanism used to manage co...
Jason Dudley, Devon Simmonds
ICSM
2009
IEEE
15 years 2 months ago
Effective and efficient localization of multiple faults using value replacement
We previously presented a fault localization technique called Value Replacement that repeatedly alters the state of an executing program to locate a faulty statement [9]. The tech...
Dennis Jeffrey, Neelam Gupta, Rajiv Gupta
COMPSAC
2011
IEEE
14 years 4 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
ICSE
2012
IEEE-ACM
13 years 6 months ago
Predicting performance via automated feature-interaction detection
Abstract—Customizable programs and program families provide user-selectable features to allow users to tailor a program to an application scenario. Knowing in advance which featu...
Norbert Siegmund, Sergiy S. Kolesnikov, Christian ...
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
15 years 9 months ago
The Importance of Articulation Work to Agency Content Management: Balancing Publication and Control
This paper describes the initial results of a qualitative field study of the work required to review and approve the content on government agency web sites. The study analyzes con...
Kristin R. Eschenfelder