Requirements models are essential not just during system implementation, but also to manage system changes post-implementation. Such models should be supported by a requirements m...
Neil A. Ernst, John Mylopoulos, Yijun Yu, Tien Ngu...
Digital Rights Management (DRM) is used to protect copyrighted content from unauthorized use. However, this has taken away the jurisdiction of the consumers over their purchased c...
—In this paper, we show that Web protocols and technologies are good candidates to design the Internet of Things, through a user-centric architecture (the user simply has to use ...
Simon Duquennoy, Gilles Grimaud, Jean-Jacques Vand...
The products of systems cannot always be judged at face value: the process by which they were obtained is also important. For instance, the rigour of a scientific experiment, the e...
Simon Miles, Paul T. Groth, Steve Munroe, Michael ...
Complex information systems have numerous design variables that are systematically decided upon during the design process. In high-variability systems, some of these decisions are...