Sciweavers

575 search results - page 38 / 115
» Introducing Service-Orientation into System Analysis and Des...
Sort
View
SG
2010
Springer
13 years 5 months ago
Event Line View: Interactive Visual Analysis of Irregular Time-Dependent Data
Abstract. In this paper we present a novel approach to visualize irregularly occurring events. We introduce the event line view designed specifically for such events data (a subset...
Kresimir Matkovic, Alan Lez, Denis Gracanin, Andre...
RE
2010
Springer
13 years 2 months ago
A goal-based framework for contextual requirements modeling and analysis
Abstract Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerg...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
CAISE
2009
Springer
14 years 2 months ago
Evaluation Patterns for Analyzing the Costs of Enterprise Information Systems
Introducing enterprise information systems (EIS) is usually associated with high costs. It is therefore crucial to understand those factors that determine or influence these costs...
Bela Mutschler, Manfred Reichert
ICCS
2009
Springer
14 years 2 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
TWC
2011
367views more  TWC 2011»
13 years 2 months ago
Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
—In this paper, the performance of the ALOHA and CSMA MAC protocols are analyzed in spatially distributed wireless networks. The main system objective is correct reception of pac...
Mariam Kaynia, Nihar Jindal, Geir E. Øien