Sciweavers

274 search results - page 12 / 55
» Security user studies: methodologies and best practices
Sort
View
CHI
2009
ACM
14 years 8 months ago
Studying appropriation of everyday technologies: a cognitive approach
The ways in which users appropriate uses of technology ? or invent new ones ? have attracted interest in CSCW-oriented research, but much less has been written on its cognitive fo...
Antti Salovaara
ASE
2008
120views more  ASE 2008»
13 years 7 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
ICSE
2012
IEEE-ACM
11 years 9 months ago
Characterizing logging practices in open-source software
—Software logging is a conventional programming practice. While its efficacy is often important for users and developers to understand what have happened in the production run, ...
Ding Yuan, Soyeon Park, Yuanyuan Zhou
SIGOPS
2008
116views more  SIGOPS 2008»
13 years 7 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra
UML
2001
Springer
13 years 12 months ago
Modeling the User Interface of Web Applications with UML
Today's User Interfaces (UIs) are complex software components, which play an essential role in the usability of an application. The development of UIs requires therefore, not ...
Rolf Hennicker, Nora Koch