Sciweavers

120 search results - page 3 / 24
» Effective Communication in Requirements Elicitation: A Compa...
Sort
View
ECIS
2004
13 years 10 months ago
Activity Based generation of requirements for web-based information systems: the SSM/ICDT approach
Web site development method is at an early stage in its evolution. Most existing methods are concerned with technical software issues and are poorly adapted to help developers thi...
Mary Meldrum, Jeremy Rose
TSE
1998
129views more  TSE 1998»
13 years 8 months ago
Inferring Declarative Requirements Specifications from Operational Scenarios
—Scenarios are increasingly recognized as an effective means for eliciting, validating, and documenting software requirements. This paper concentrates on the use of scenarios for...
Axel van Lamsweerde, Laurent Willemet
ASYNC
2003
IEEE
97views Hardware» more  ASYNC 2003»
14 years 1 months ago
Energy and Performance Models for Clocked and Asynchronous Communication
Parameterized first-order models for throughput, energy, and bandwidth are presented in this paper. Models are developed for many common pipeline methodologies, including clocked...
Kenneth S. Stevens
ECIS
2000
13 years 10 months ago
A Study of Requirements Negotiations in Virtual Project Teams
Recent advancements in communication systems enable the collaboration of virtual software design teams, breaking the barriers of time and distance. In this paper we address a criti...
Daniela E. Damian, Mildred L. G. Shaw, Brian R. Ga...
ISQED
2005
IEEE
87views Hardware» more  ISQED 2005»
14 years 2 months ago
A Practical Transistor-Level Dual Threshold Voltage Assignment Methodology
Leakage power has become one of the most critical design concerns for the system-level chip designer. Multi-threshold techniques have been used to reduce runtime leakage power wit...
Puneet Gupta, Andrew B. Kahng, Puneet Sharma