Sciweavers

383 search results - page 5 / 77
» Reusing Scenario Based Approaches in Requirement Engineering...
Sort
View
QSIC
2005
IEEE
14 years 1 months ago
Ontology Based Requirements Analysis: Lightweight Semantic Processing Approach
We propose a software requirements analysis method based on domain ontology technique, where we can establish a mapping between a software requirements specification and the doma...
Haruhiko Kaiya, Motoshi Saeki
MMM
2012
Springer
294views Multimedia» more  MMM 2012»
12 years 3 months ago
A Fuzzy Rank-Based Late Fusion Method for Image Retrieval
Rank-based fusion is indispensable in multiple search setups in lack of item retrieval scores, such as in meta-search with non-cooperative engines. We introduce a novel, simple, an...
Savvas A. Chatzichristofis, Konstantinos Zagoris, ...
WER
2005
Springer
14 years 1 months ago
Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce
This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method in...
Simara Vieira da Rocha, Zair Abdelouahab, Eduardo ...
IWPC
2006
IEEE
14 years 2 months ago
Towards a Client Driven Characterization of Class Hierarchies
Object-oriented legacy systems are hard to maintain because they are hard to understand. One of the main understanding problems is revealed by the so-called ”yo-yo effect” tha...
Petru Florin Mihancea
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...