Sciweavers

2205 search results - page 402 / 441
» Mutation Operators for Specifications
Sort
View
CHI
2010
ACM
14 years 2 months ago
The true cost of unusable password policies: password use in the wild
HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We pr...
Philip Inglesant, Martina Angela Sasse
EDOC
2003
IEEE
14 years 2 months ago
Towards a Language for Coherent Enterprise Architecture Descriptions
A coherent description of architectures provides insight, enables communication among different stakeholders and guides complicated (business and ICT) change processes. Unfortunat...
Henk Jonkers, René van Buuren, Farhad Arbab...
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
14 years 2 months ago
MOBICHARTS: A Notation to Specify Mobile Computing Applications
A standard notation, that unambiguously expresses different aspects of a system, is important to the process of software development. The expressiveness of a standard notation hel...
Satyajit Acharya, Hrushikesha Mohanty, R. K. Shyam...
RSP
2003
IEEE
176views Control Systems» more  RSP 2003»
14 years 2 months ago
Rapid Design and Analysis of Communication Systems Using the BEE Hardware Emulation Environment
This paper describes the early analysis and estimation features currently implemented in the Berkeley Emulation Engine (BEE) system. BEE is an integrated rapid prototyping and des...
Chen Chang, Kimmo Kuusilinna, Brian C. Richards, A...
AOSD
2003
ACM
14 years 2 months ago
Modularisation and composition of aspectual requirements
An effective requirements engineering (RE) approach must harmonise the need to achieve separation of concerns with the need to satisfy broadly scoped requirements and constraints....
Awais Rashid, Ana M. D. Moreira, João Ara&u...