Sciweavers

662 search results - page 18 / 133
» Involving End Users in Distributed Requirements Engineering
Sort
View
ASWEC
2005
IEEE
14 years 1 months ago
Deriving Systems Level Security Properties of Component Based Composite Systems
This paper proposes an approach of defining systemslevel security properties of component-based composite systems. It argues that the security properties of a composite system ca...
Khaled M. Khan, Jun Han
ADL
1998
Springer
178views Digital Library» more  ADL 1998»
13 years 11 months ago
Distributed Digital Library Architecture Incorporating Different Index Styles
The New Zealand Digital Library offers several collections of information over the World Wide Web. Although fulltext indexing is the primary access mechanism, musical collections ...
Rodger J. McNab, Ian H. Witten, Stefan J. Boddie
EDOC
2002
IEEE
14 years 10 days ago
Constraint Based Network Adaptation for Ubiquitous Applications
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
Krish T. Krishnakumar, Morris Sloman
INTERACT
1997
13 years 8 months ago
Usability Engineering in Industrial Practice
ABSTRACT Do developers use proven usability techniques like user involvement, usability testing, and iterative design in industrial practice? Based on inside knowledge of many diff...
Søren Lauesen
ICSE
2008
IEEE-ACM
14 years 7 months ago
Fostering user-developer collaboration with infrastructure probes
In this paper we present a new variation of cultural probes, called Infrastructure Probes (IP). IPs can be seen as an additional ethnographic method to get a deeper understanding ...
Christian Dörner, Jan Heß, Volkmar Pipe...