Sciweavers

213 search results - page 15 / 43
» Critical Requirements Engineering Issues and their Solution
Sort
View
ICAIL
2007
ACM
13 years 11 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
DEXAW
2008
IEEE
120views Database» more  DEXAW 2008»
14 years 1 months ago
Self-Similarity Metric for Index Pruning in Conceptual Vector Space Models
— One of the critical issues in search engines is the size of search indexes: as the number of documents handled by an engine increases, the search must preserve its efficiency,...
Dario Bonino, Fulvio Corno
AOSD
2005
ACM
14 years 1 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
ICSEA
2007
IEEE
14 years 1 months ago
Making Cost Effective Security Decision with Real Option Thinking
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
Jingyue Li, Xiaomeng Su
CAISE
2001
Springer
13 years 12 months ago
Objects Control for Software Configuration Management
A major requirement in Software Engineering is to reduce the time to market. This requirement along with a demand for product sophistication and better quality has led to larger te...
Jacky Estublier