If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Search based optimization techniques have been applied to structural software test data generation since 1992, with a recent upsurge in interest and activity within this area. How...
Strategy planning processes often suffer from a lack of conceptual models that can be used to represent business strategies in a structured and standardized form. If natural langu...
Information Systems (IS) design research tends to emphasise the development of new methods (normative research), while addressing the evaluation of methods in only a limited fashi...
Abstract. We present a goal-based approach for visualizing and browsing the search space of available Web services. A goal describes an obthat a client wants to solve by using Web ...