Sciweavers

5668 search results - page 151 / 1134
» Overlaps in Requirements Engineering
Sort
View
101
Voted
BPM
2003
Springer
75views Business» more  BPM 2003»
15 years 8 months ago
Security in Business Process Engineering
We present a general methodology for integrating arbitrary security requirements in the development of business processes in a both elegant and rigorous way. We show how trust rela...
Michael Backes, Birgit Pfitzmann, Michael Waidner
125
Voted
IJSTM
2000
117views more  IJSTM 2000»
15 years 3 months ago
Architectural design support for business process and business network engineering
Abstract: Concurrent enterprises and networks of business processes cannot function without each other. Cooperation in networks allows for faster reaction to business opportunities...
Henry M. Franken, René Bal, Harmen van den ...
137
Voted
RE
2002
Springer
15 years 3 months ago
Rationale-Based Use Case Specification
Abstract. Few requirements engineering techniques are widely applied in industry. This can
Allen H. Dutoit, Barbara Paech
152
Voted
IBPRIA
2005
Springer
15 years 9 months ago
Robust Person-Independent Visual Sign Language Recognition
Sign language recognition constitutes a challenging field of research in computer vision. Common problems like overlap, ambiguities, and minimal pairs occur frequently and require...
Jörg Zieren, Karl-Friedrich Kraiss
94
Voted
ICCAD
1999
IEEE
113views Hardware» more  ICCAD 1999»
15 years 7 months ago
Attractor-repeller approach for global placement
Traditionally, analytic placement used linear or quadratic wirelength objective functions. Minimizing either formulation attracts cells sharing common signals (nets) together. The...
Hussein Etawil, Shawki Areibi, Anthony Vannelli