Sciweavers

286 search results - page 30 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
WER
1999
Springer
13 years 12 months ago
Activity Theory: a Framework to Software Requirements Elicitation
In this article we defend the idea that social aspects have strong influence in the software requirements elicitation (Goguen 1993), which drive us to find help in the social scien...
Luiz Eduardo Galvão Martins, Beatriz Mascia...
CRIWG
2004
13 years 9 months ago
Increasing Awareness in Distributed Software Development Workspaces
Abstract. This work presents a middleware for collaborative applications that increase product and workspace awareness information available to users of computer-aided software eng...
Marco A. S. Mangan, Marcos R. S. Borges, Clá...
ICST
2009
IEEE
14 years 2 months ago
Quality Assurance of Software Applications Using the In Vivo Testing Approach
Software products released into the field typically have some number of residual defects that either were not detected or could not have been detected during testing. This may be...
Christian Murphy, Gail E. Kaiser, Ian Vo, Matt Chu
ICDE
2009
IEEE
173views Database» more  ICDE 2009»
13 years 5 months ago
Efficient Mining of Closed Repetitive Gapped Subsequences from a Sequence Database
There is a huge wealth of sequence data available, for example, customer purchase histories, program execution traces, DNA, and protein sequences. Analyzing this wealth of data to ...
Bolin Ding, David Lo, Jiawei Han, Siau-Cheng Khoo
CIC
2006
198views Communications» more  CIC 2006»
13 years 9 months ago
Communication Model to Support Rapid Application Development
Communication systems, along with database systems, have attracted a lot of attention in software engineering research. Encouraged by the success of SQL systems, some early effort...
Yingbo Wang, Peter J. Clarke, Yi Deng