Sciweavers

621 search results - page 43 / 125
» Identifying the (Tele)Presence Literature
Sort
View
ICSM
2000
IEEE
14 years 3 days ago
Recovering Class Diagrams from Data-Intensive Legacy Systems
Several reverse engineering methods for recovering objects from legacy systems have been proposed in the literature, but most of them neglect to identify the relationships among t...
Giuseppe A. Di Lucca, Anna Rita Fasolino, Ugo de C...
CAISE
2007
Springer
13 years 11 months ago
Deciding to Adopt Requirements Traceability in Practice
The use of requirements traceability for information systems development (ISD) projects is not very common in practice despite its often mentioned advantages in the literature. We ...
Floris Blaauboer, Klaas Sikkel, Mehmet N. Aydin
DSN
2007
IEEE
13 years 11 months ago
Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes
Increasing interest is being paid to quantitative evaluation based on measurements of dependability attributes and metrics of computer systems and infrastructures. Despite measura...
Andrea Bondavalli, Andrea Ceccarelli, Lorenzo Fala...
GI
2009
Springer
13 years 11 months ago
Classifying Privacy and Verifiability Requirements for Electronic Voting
Abstract: Voter privacy and verifiability are fundamental security concepts for electronic voting. Existing literature on electronic voting provides many definitions and interpreta...
Lucie Langer, Axel Schmidt, Melanie Volkamer, Joha...
APCHI
2004
IEEE
13 years 11 months ago
HCI Practices and the Work of Information Architects
We interviewed 26 information architects about their work, their backgrounds and their perceptions of their roles as information architects. Our research aimed to identify and unde...
Toni Robertson, Cindy Hewlett