This study examined a collaborative tool intervention within a geographically-distributed, engineering-design team in a large manufacturing company. Baseline data collection to de...
Elizabeth E. Wierba, Thomas A. Finholt, Michelle P...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
This paper describes the application of the WinWin paradigm to identify and resolve conflicts in a series of real-client, student-developer digital library projects. The paper is ...
Hoh In, Barry W. Boehm, Thomas Lee Rodgers, Michae...
This paper introduces S.P.L.O.T., a Web-based reasoning and configuration system for Software Product Lines (SPLs). The system benefits from mature logic-based reasoning techniq...