Sciweavers

1210 search results - page 26 / 242
» Specifying Precise Use Cases with Use Case Charts
Sort
View
129
Voted
IEAAIE
2007
Springer
15 years 10 months ago
Case Analysis of Criminal Behaviour
In this paper, it is shown how behavioural properties can be specified for three types of violent criminals. Moreover, it is shown how empirical material in the form of informal de...
Tibor Bosse, Charlotte Gerritsen, Jan Treur
132
Voted
ISPW
2005
IEEE
15 years 9 months ago
Process Programming to Support Medical Safety: A Case Study on Blood Transfusion
Medical errors are now recognized as a major cause of untimely deaths or other adverse medical outcomes. To reduce the number of medical errors, the Medical Safety Project at the U...
Lori A. Clarke, Yao Chen, George S. Avrunin, Bin C...
CICLING
2004
Springer
15 years 9 months ago
Towards Programming in Everyday Language: A Case for Email Management
Abstract. In order to extend the application domain of natural language interfaces to more realistic tasks without the decrease of user’s performance, it is desirable for users t...
Toru Sugimoto, Noriko Ito, Shino Iwashita, Michio ...
CINQ
2004
Springer
182views Database» more  CINQ 2004»
15 years 7 months ago
Mining Constrained Graphs: The Case of Workflow Systems
Abstract. Constrained graphs are directed graphs describing the control flow of processes models. In such graphs, nodes represent activities involved in the process, and edges the ...
Gianluigi Greco, Antonella Guzzo, Giuseppe Manco, ...
125
Voted
COMPSAC
2005
IEEE
15 years 9 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine