Sciweavers

5668 search results - page 88 / 1134
» Overlaps in Requirements Engineering
Sort
View
CCS
2006
ACM
14 years 2 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
AOSD
2003
ACM
14 years 3 months ago
Modularisation and composition of aspectual requirements
An effective requirements engineering (RE) approach must harmonise the need to achieve separation of concerns with the need to satisfy broadly scoped requirements and constraints....
Awais Rashid, Ana M. D. Moreira, João Ara&u...
EUROMICRO
1999
IEEE
14 years 2 months ago
Processing Requirements by Software Configuration Management
Short development life cycles, the importance of timeto-market and fast changes in technology influence the requirements engineering process. Requirements are exposed to changes d...
Ivica Crnkovic, Peter J. Funk, Magnus Larsson
ICDAR
1997
IEEE
14 years 2 months ago
Memory efficient skeletonization of utility maps
An algorithm is presented that allows to perform skeletonization of large maps with much lower memory requirements than with the straightforward approach. The maps are divided int...
Albert M. Vossepoel, Klamer Schutte, Carl F. P. De...
IEEECIT
2007
IEEE
14 years 4 months ago
The Value Gap Model: Value-Based Requirements Elicitation
The User requirements of many web-based services are dynamically and continuously changing even during the service time itself. For that reason, web service companies always keep ...
Sang Won Lim, Taek Lee, Sangsoo Kim, Hoh Peter In