Sciweavers

391 search results - page 21 / 79
» Requirements Elicitation Using a Combination of Prototypes a...
Sort
View
TRIDENTCOM
2010
IEEE
13 years 5 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
BCSHCI
2008
13 years 9 months ago
Provoking creative design: making it scale
Creativity is indispensable for more innovative interactive system development. This tutorial is relevant to anyone involved in large projects that are exploiting new technologies...
Neil A. M. Maiden, Sara Jones
MT
2010
110views more  MT 2010»
13 years 6 months ago
Metrics for MT evaluation: evaluating reordering
Translating between dissimilar languages requires an account of the use of divergent word orders when expressing the same semantic content. Reordering poses a serious problem for s...
Alexandra Birch, Miles Osborne, Phil Blunsom
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 9 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
UIST
2004
ACM
14 years 1 months ago
Clip, connect, clone: combining application elements to build custom interfaces for information access
Many applications provide a form-like interface for requesting information: the user fills in some fields, submits the form, and the application presents corresponding results. ...
Jun Fujima, Aran Lunzer, Kasper Hornbæk, Yuz...