Sciweavers

174 search results - page 24 / 35
» On Finding Duplication and Near-Duplication in Large Softwar...
Sort
View
HICSS
2003
IEEE
111views Biometrics» more  HICSS 2003»
14 years 20 days ago
Modeling the User Acceptance of E-Mail
The Technology Acceptance Model (TAM) predicts whether users will ultimately use software applications based upon causal relationships among belief and attitudinal constructs that...
Geoffrey S. Hubona, Andrew Burton-Jones
GRAPHICSINTERFACE
2001
13 years 8 months ago
Interacting with Image Sequences: Detail-in-Context and Thumbnails
An image sequence is a series of interrelated images. To enable navigation of large image sequences, many current software packages display small versions of the images, called th...
Oliver Kuederle, Kori Inkpen, M. Stella Atkins, M....
EUROMICRO
2006
IEEE
14 years 1 months ago
Value-Based Selection of Requirements Engineering Tool Support
In large software and systems engineering companies like Siemens PSE there are several requirements tools in use. There is no “one tool fits all projects/departments” solution...
Matthias Heindl, Franz Reinisch, Stefan Biffl, Ale...
HICSS
2006
IEEE
155views Biometrics» more  HICSS 2006»
14 years 1 months ago
Contextualizing Knowledge Management Readiness to Support Change Management Strategies
Research on knowledge management (KM) readiness has matured. However, recent organizational structures have emerged which prevent traditional instruments from adequately measuring...
Mark Keith, Michael Goul, Haluk Demirkan, Jason Ni...
VSTTE
2010
Springer
13 years 5 months ago
Towards Scalable Modular Checking of User-Defined Properties
Abstract. Theorem-prover based modular checkers have the potential to perform scalable and precise checking of user-defined properties by combining pathsensitive intraprocedural re...
Thomas Ball, Brian Hackett, Shuvendu K. Lahiri, Sh...