Sciweavers

356 search results - page 24 / 72
» Interaction Diagrams
Sort
View
KBSE
2007
IEEE
14 years 3 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
W4A
2006
ACM
14 years 3 months ago
GraSSML: accessible smart schematic diagrams for all
Graphical representations are a powerful way of conveying information. Their use has made life much easier for most sighted users, but people with disabilities or users who work i...
Zaineb Ben Fredj, David A. Duce
RE
2004
Springer
14 years 2 months ago
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems
We present a method to identify stakeholders and their preferences about non-functional requirements (NFR) by using use case diagrams of existing systems. We focus on the changes ...
Haruhiko Kaiya, Akira Osada, Kenji Kaijiri
FIW
2009
134views Communications» more  FIW 2009»
13 years 6 months ago
Feature Diagrams for Change-Oriented Programming
Abstract. The idea of feature-oriented programming is to map requirements to features, concepts that can be composed to form a software product. Change-oriented programming (ChOP),...
Peter Ebraert, Andreas Classen, Patrick Heymans, T...
SI3D
2006
ACM
14 years 3 months ago
Jump flooding in GPU with applications to Voronoi diagram and distance transform
This paper studies jump flooding as an algorithmic paradigm in the general purpose computation with GPU. As an example application of jump flooding, the paper discusses a constant...
Guodong Rong, Tiow Seng Tan