Sciweavers

1792 search results - page 20 / 359
» Requirements Capture with RCAT
Sort
View
HT
2004
ACM
14 years 1 months ago
Saving private hypertext: requirements and pragmatic dimensions for preservation
The preservation of literary hypertexts presents significant challenges if we are to ensure continued access to them as the underlying technology changes. Not only does such an ef...
Catherine C. Marshall, Gene Golovchinsky
SIGSOFT
2005
ACM
14 years 9 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
ICSE
2012
IEEE-ACM
11 years 10 months ago
Engineering and verifying requirements for programmable self-assembling nanomachines
—We propose an extension of van Lamsweerde’s goal-oriented requirements engineering to the domain of programmable DNA nanotechnology. This is a domain in which individual devic...
Robyn R. Lutz, Jack H. Lutz, James I. Lathrop, Tit...
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 3 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
3DPH
2009
128views Healthcare» more  3DPH 2009»
13 years 9 months ago
Predicting Missing Markers in Real-Time Optical Motion Capture
Abstract. A common problem in optical motion capture of human-body movement is the so-called missing marker problem. The occlusion of markers can lead to significant problems in tr...
Tommaso Piazza, Johan Lundström, Andreas Kunz...