Sciweavers

110 search results - page 9 / 22
» Evaluating Methodologies: A Requirements Engineering Approac...
Sort
View
ICSE
2009
IEEE-ACM
13 years 5 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...
ACSC
2009
IEEE
14 years 2 months ago
Microdata Protection Through Approximate Microaggregation
Microdata protection is a hot topic in the field of Statistical Disclosure Control, which has gained special interest after the disclosure of 658000 queries by the America Online...
Xiaoxun Sun, Hua Wang, Jiuyong Li
CEEMAS
2005
Springer
14 years 1 months ago
MAS Meta-models on Test: UML vs. OPM in the SODA Case Study
In the AOSE (Agent-Oriented Software Engineering) area, several research efforts are underway to develop appropriate meta-models for agent-oriented methodologies. Meta-models are ...
Ambra Molesini, Enrico Denti, Andrea Omicini
CODES
2009
IEEE
14 years 2 months ago
On compile-time evaluation of process partitioning transformations for Kahn process networks
Kahn Process Networks is an appealing model of computation for programming and mapping applications onto multi-processor platforms. Autonomous processes communicate through unboun...
Sjoerd Meijer, Hristo Nikolov, Todor Stefanov
STEP
2005
IEEE
14 years 1 months ago
TETE: A Non-Invasive Unit Testing Framework for Source Transformation
While the use of test-driven development as a debugging, pedagogic, and analytical methodology for objectoriented and procedural systems is well documented, it is a relatively une...
Derek M. Shimozawa, James R. Cordy