Sciweavers

354 search results - page 12 / 71
» Method construction - a core approach to organizational engi...
Sort
View
DEXAW
2002
IEEE
151views Database» more  DEXAW 2002»
14 years 17 days ago
Domain-Independent eNegotiation Design: Prospects, Methods, and Challenges
Designing electronic markets is still a rather intricate process. eNegotiation - and thereby trading rules - embody the core of the institution ”electronic market”. Although s...
Dirk Neumann, Christof Weinhardt
KBSE
2008
IEEE
14 years 2 months ago
Cleman: Comprehensive Clone Group Evolution Management
—Recent research results have shown more benefits of the management of code clones, rather than detecting and removing them. However, existing management approaches for code clo...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
AGILEDC
2008
IEEE
14 years 2 months ago
Agile Methods and User-Centered Design: How These Two Methodologies are Being Successfully Integrated in Industry
A core principle of Agile development is to satisfy the customer by providing valuable software on an early and continuous basis. For a software application to be valuable it shou...
David Fox, Jonathan Sillito, Frank Maurer
EUSFLAT
2003
175views Fuzzy Logic» more  EUSFLAT 2003»
13 years 9 months ago
A multiattribute decision making approach using intuitionistic fuzzy sets
The concept of intuitionistic fuzzy sets is the generalization of the concept of fuzzy sets. The theory of intuitionistic fuzzy sets is well suited to dealing with vagueness. Rece...
Deng-Feng Li, Jian-Bo Yang
FOSSACS
2008
Springer
13 years 9 months ago
Compositional Methods for Information-Hiding
Protocols for information-hiding often use randomized primitives to obfuscate the link between the observables and the information to be protected. The degree of protection provide...
Christelle Braun, Konstantinos Chatzikokolakis, Ca...