Sciweavers

424 search results - page 22 / 85
» Requirements Prioritization Challenges in Practice
Sort
View
CHI
2010
ACM
14 years 2 months ago
Bridging the gap: moving from contextual analysis to design
A typical product development lifecycle for interactive systems starts with contextual analysis to guide system design. The challenge however is in transitioning from findings abo...
Tejinder K. Judge, Carman Neustaedter, Anthony Tan...
DAC
2004
ACM
14 years 8 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
AIME
2007
Springer
14 years 1 months ago
Using Semantic Web Technologies for Knowledge-Driven Querying of Biomedical Data
Software applications that work with biomedical data have significant knowledge-management requirements. Formal knowledge models and knowledge-based methods can be very useful in m...
Martin J. O'Connor, Ravi Shankar, Samson W. Tu, Cs...
WPES
2005
ACM
14 years 1 months ago
Mining rule semantics to understand legislative compliance
Organizations in privacy-regulated industries (e.g. healthcare and financial institutions) face significant challenges when developing policies and systems that are properly align...
Travis D. Breaux, Annie I. Antón
SIS
2008
13 years 9 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...