Sciweavers

6978 search results - page 35 / 1396
» Reframing Requirements Analysis
Sort
View
SAFECOMP
2000
Springer
14 years 1 months ago
Controlling Requirements Evolution: An Avionics Case Study
This paper presents an empirical investigation of the control of requirements evolution in an avionics safety-critical system. Metrics can be used to manage (e.g., control and pred...
Stuart Anderson, Massimo Felici
SOUPS
2010
ACM
14 years 2 months ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
MIDDLEWARE
2004
Springer
14 years 3 months ago
Security requirements in service oriented architectures for ubiquitous computing
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Domenico Cotroneo, Almerindo Graziano, Stefano Rus...
GROUP
1999
ACM
14 years 2 months ago
From description to requirements: an activity theoretic perspective
This paper demonstrates how activity theoretic concepts can be used in conjunction with an ethnographically informed approach to derive requirements on a work situation. We presen...
Phil Turner, Susan Turner, Julie Horton
PADS
2005
ACM
14 years 3 months ago
Requirements on Worm Mitigation Technologies in MANETS
This study presents an analysis of the impact of mitigation on computer worm propagation in Mobile Ad-hoc Networks (MANETS). According to the recent DARPA BAA Defense Against Cybe...
Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andr...