Sciweavers

5101 search results - page 43 / 1021
» Capturing Context Requirements
Sort
View
ACSAC
1999
IEEE
14 years 3 days ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
EUC
2004
Springer
14 years 1 months ago
Context-Aware State Management for Ubiquitous Applications
In a ubiquitous computing environment, users continuously access computing services and interact with smart spaces, while moving from one place to another. Application migration, t...
Pauline P. L. Siu, Nalini Moti Belaramani, Cho-Li ...
CVPR
2007
IEEE
14 years 9 months ago
Real-time Gesture Recognition with Minimal Training Requirements and On-line Learning
In this paper, we introduce the semantic network model (SNM), a generalization of the hidden Markov model (HMM) that uses factorization of state transition probabilities to reduce...
Stjepan Rajko, Gang Qian, Todd Ingalls, Jodi James
EWSA
2006
Springer
13 years 11 months ago
Preserving Software Quality Characteristics from Requirements Analysis to Architectural Design
In this paper, we present a pattern-based software development method that preserves usability and security quality characteristics using a role-driven mapping of requirements anal...
Holger Schmidt, Ina Wentzlaff
SPLC
2010
13 years 5 months ago
Configuring Software Product Line Feature Models Based on Stakeholders' Soft and Hard Requirements
Abstract. Feature modeling is a technique for capturing commonality and variability. Feature models symbolize a representation of the possible application configuration space, and ...
Ebrahim Bagheri, Tommaso Di Noia, Azzurra Ragone, ...