As distributed technologies become more widely used, the need for assessing the quality of distributed applications correspondingly increases. Despite the rich body of research an...
The Unified Software Development Process (USDP) and Unified Modeling Language (UML) have been now generally accepted as the standard methodology and modeling language for developin...
Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have b...
With the advent of the Web, search has become the prominent paradigm for information seeking, not only across the online space but also within enterprises. Search engine functiona...
Alessandro Bozzon, Marco Brambilla, Piero Fraterna...
Requirements Engineering (RE) investigates the impact of a future-oriented change vision, but the move towards this vision must consider a context heavily shaped by the past. As R...
Peter Haumer, Matthias Jarke, Klaus Pohl, Patrick ...