Sciweavers

383 search results - page 16 / 77
» Reusing Scenario Based Approaches in Requirement Engineering...
Sort
View
IEEEHPCS
2010
13 years 6 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
SACMAT
2003
ACM
14 years 1 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
CICLING
2010
Springer
14 years 2 days ago
Word Length n-Grams for Text Re-use Detection
Abstract. The automatic detection of shared content in written documents –which includes text reuse and its unacknowledged commitment, plagiarism– has become an important probl...
Alberto Barrón-Cedeño, Chiara Basile...
ERSHOV
2003
Springer
14 years 1 months ago
The Outside-In Method of Teaching Introductory Programming
The new design for the introductory programming course at ETH relies on object technology, Eiffel, extensive reuse, a graphics-rich library (TRAFFIC) built specifically for the c...
Bertrand Meyer
ICSE
2003
IEEE-ACM
14 years 8 months ago
Scenario-based Assessment of Software Architecture Usability
Over the years the software engineering community has increasingly realized the important role software architecture plays in fulfilling the quality requirements of a system. The ...
Eelke Folmer, Jilles van Gurp, Jan Bosch