Sciweavers

782 search results - page 103 / 157
» Ethnographically informed analysis for software engineers
Sort
View
APSEC
2005
IEEE
15 years 9 months ago
Monitoring with Behavior View Diagrams for Debugging
UML sequence diagrams are widely used during requirements analysis and design for specifying the expected message exchanges among a set of objects in various scenarios for the pro...
Donglin Liang, Kai Xu 0002
CAISE
2010
Springer
14 years 11 months ago
Configuring the Variability of Business Process Models Using Non-Functional Requirements
The existence of variations in the organizational environment makes the configuration of business process models a complex activity, even for experienced business analysts. The inc...
Emanuel Santos, João Pimentel, Jaelson Cast...
164
Voted
SIGSOFT
2007
ACM
16 years 4 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
IOLTS
2006
IEEE
81views Hardware» more  IOLTS 2006»
15 years 10 months ago
Evaluating SEU and Crosstalk Effects in Network-on-Chip Routers
This work intends to evaluate the effect of a Single Event Upsets (SEUs) and crosstalk faults in a NoC router architecture by developing a fault injection mechanism, allowing an a...
Arthur Pereira Frantz, Luigi Carro, Érika F...
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 10 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...