Sciweavers

489 search results - page 85 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
GIS
2003
ACM
14 years 11 months ago
A predictive location model for location-based services
Location-Based Services (LBSs) utilize information about users' locations through location-aware mobile devices to provide services, such as nearest features of interest, the...
Hassan A. Karimi, Xiong Liu
ICSE
2001
IEEE-ACM
14 years 2 months ago
The Coming-of-Age of Software Architecture Research
Over the past decade, software architecture research has emerged as the principled study of the overall structure of software systems, especially the relations among subsystems an...
Mary M. Shaw
SCAM
2003
IEEE
14 years 3 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
DAGSTUHL
2006
13 years 11 months ago
Model Transformation Technologies in the Context of Modelling Software Systems
Programming technologies have improved continuously during the last decades, but from an Information Systems perspective, some well-known problems associated to the design and impl...
Oscar Pastor
ISSTA
2004
ACM
14 years 3 months ago
An experimental evaluation of continuous testing during development
Continuous testing uses excess cycles on a developer’s workstation to continuously run regression tests in the background, providing rapid feedback about test failures as source...
David Saff, Michael D. Ernst