Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Reverse engineering is concerned with the reconstruction of surfaces from three-dimensional point clouds originating from laser-scanned objects. We present an adaptive surface rec...
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Based on interviews with projec...
The tremendous advances in gaming technologies over the past decade have focused primarily on the physical realism of the game environment and game characters, and the complexity ...
This paper presents a mobile service robot that assists users in biological and pharmaceutical laboratories by carrying out routine jobs such as filling and transportation of micr...
Erik Schulenburg, Norbert Elkmann, Markus Fritzsch...