Sciweavers

3883 search results - page 142 / 777
» Design mentoring based on design evolution analysis
Sort
View
FASE
2008
Springer
13 years 11 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
SIGDOC
2006
ACM
14 years 3 months ago
Handling objects: a scenario based approach
We report on the development of a tool which supports software programmers in programming to an interface by providing just in time (JIT) solutions. The development of the tool wa...
Thomas George Kannampallil, John M. Daughtry III
ER
2008
Springer
91views Database» more  ER 2008»
13 years 11 months ago
Location-Based Software Modeling and Analysis: Tropos-Based Approach
The continuous growth of interest in mobile applications makes the concept of location essential to design and develop software systems. Location-based software is supposed to be a...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
GECCO
2008
Springer
148views Optimization» more  GECCO 2008»
13 years 10 months ago
Solving constrained multi-objective problems by objective space analysis
In this paper a new approach to solve constrained multi-objective problems by way of evolutionary multi-objective optimization is introduced. In contrast to former evolutionary ap...
Gideon Avigad, Carlos A. Coello Coello
CSCW
2002
ACM
13 years 9 months ago
Physical and Virtual Tools: Activity Theory Applied to the Design of Groupware
Activity theory is based on the concept of tools mediating between subjects and objects. In this theory, an individual's creative interaction with his or her surroundings can ...
Morten Fjeld, Kristina Lauche, Martin Bichsel, Fre...