Sciweavers

6147 search results - page 12 / 1230
» Requirements, Architectures and Risks
Sort
View
DAC
1995
ACM
14 years 2 months ago
Requirements-Based Design Evaluation
Stephen T. Frezza, Steven P. Levitan, Panos K. Chr...
RE
2009
Springer
14 years 3 months ago
Improving the Exchange of Requirements and Specifications between Business Partners
Increasingly complex supplier-relationships dominate product development, independent of industries and products. Mostly the primary source of risks and later problems is insuffic...
Manuel Reis Monteiro, Christof Ebert, Matthias Rec...
EUROMICRO
2007
IEEE
14 years 5 months ago
Scope Management of Non-Functional Requirements
Getting business stakeholders’ goals formulated clearly and project scope defined realistically increases the chance of success for any application development process. As a cons...
Mohamad Kassab, Maya Daneva, Olga Ormandjieva
RE
2009
Springer
14 years 5 months ago
Trust Trade-off Analysis for Security Requirements Engineering
Abstract—Security requirements often have implicit assumptions about trust relationships among actors. The more actors trust each other, the less stringent the security requireme...
Golnaz Elahi, Eric S. K. Yu
ICRA
2006
IEEE
225views Robotics» more  ICRA 2006»
14 years 4 months ago
Constraint Optimization Coordination Architecture for Search and Rescue Robotics
— The dangerous and time sensitive nature of a disaster area makes it an ideal application for robotic exploration. Our long term goal is to enable humans, software agents, and a...
Mary Koes, Illah R. Nourbakhsh, Katia P. Sycara