Sciweavers

489 search results - page 10 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
PODS
1990
ACM
150views Database» more  PODS 1990»
13 years 11 months ago
On Being Optimistic about Real-Time Constraints
- Performancestudiesof concurrencycontrol algorithms for conventional database systems have shown that, under most operating circumstances, locking protocols outperform optimistic ...
Jayant R. Haritsa, Michael J. Carey, Miron Livny
WER
2010
Springer
13 years 5 months ago
From User Requirements to Tasks Descriptions in Real-Time Systems
Real-time scheduling theory has made a great progress in the last decades. From small devices to enormous satellites or industrial plants take advantage of this ongoing research. H...
Leo Ordínez, David Donari, Rodrigo M. Santo...
CSCW
2011
ACM
13 years 2 months ago
It's about time: confronting latency in the development of groupware systems
The presence of network latency leads to usability problems in distributed groupware applications. Example problems include difficulty synchronizing tightly-coupled collaboration...
Cheryl Savery, T. C. Nicholas Graham
ICSE
1995
IEEE-ACM
13 years 11 months ago
Deriving Specifications from Requirements: An Example
A requirement is a desired relationship among phenomena of the environment of a system, to be brought about by the hardware/software machine that will be constructed and installed...
Michael Jackson, Pamela Zave
FDG
2009
ACM
14 years 2 months ago
A requirements analysis for videogame design support tools
Designing videogames involves weaving together systems of rules, called game mechanics, which support and structure compelling player experiences. Thus a significant portion of ga...
Mark J. Nelson, Michael Mateas