Sciweavers

932 search results - page 95 / 187
» Improving Requirements Engineering by Quality Modelling - A ...
Sort
View
FASE
2009
Springer
14 years 3 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
KYOTODL
2000
87views more  KYOTODL 2000»
13 years 10 months ago
Modeling Customizable Web Applications
The web is more and more used as a platform for fullfledged, increasingly complex applications, where a huge amount of change-intensive data is managed by underlying database syst...
Gerti Kappel, Werner Retschitzegger, Wieland Schwi...
CAISE
2010
Springer
13 years 10 months ago
Situational Evaluation of Method Fragments: An Evidence-Based Goal-Oriented Approach
Despite advances in situational method engineering, many software organizations continue to adopt an ad-hoc mix of method fragments from wellknown development methods such as Scrum...
Hesam Chiniforooshan Esfahani, Eric Yu, Jordi Cabo...
ICWE
2005
Springer
14 years 2 months ago
An Article Language Model for BBS Search
Bulletin Board Systems (BBS), similar to blogs, newsgroups, online forums, etc., are online broadcasting spaces where people can exchange ideas and make announcements. As BBS are b...
Jingfang Xu, Yangbo Zhu, Xing Li
CBMS
2008
IEEE
14 years 3 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...