Sciweavers

1210 search results - page 58 / 242
» Specifying Precise Use Cases with Use Case Charts
Sort
View
COMPSAC
2006
IEEE
15 years 10 months ago
An Aspect-Oriented Approach to Security Requirements Analysis
This paper presents an aspect-oriented approach to integrated elicitation of functional and security requirements based on use case-driven development. We identify security threat...
Dianxiang Xu, Vivek Goel, Kendall E. Nygard
SGAI
2004
Springer
15 years 9 months ago
Modelling Shared Extended Mind and Collective Representational Content
Some types of animals exploit the external environment to support their cognitive processes, in the sense of patterns created in the environment that function as external mental s...
Tibor Bosse, Catholijn M. Jonker, Martijn C. Schut...
98
Voted
IJACTAICIT
2010
167views more  IJACTAICIT 2010»
15 years 1 months ago
Segmentation of Tumor Tissue in Gray Medical Images Using Watershed Transformation Method
The new imaging techniques for organic body tissue give more details and information about the normal and abnormal tissue that help to distinguish the overlapping in margin of eac...
Saif D. Salman, Ahmed A. Bahrani
MSR
2009
ACM
15 years 10 months ago
Assigning bug reports using a vocabulary-based expertise model of developers
For popular software systems, the number of daily submitted bug reports is high. Triaging these incoming reports is a time consuming task. Part of the bug triage is the assignment...
Dominique Matter, Adrian Kuhn, Oscar Nierstrasz
RTCSA
2008
IEEE
15 years 10 months ago
Verification of COMDES-II Systems Using UPPAAL with Model Transformation
COMDES-II is a component-based software framework intended for Model Integrated Computing (MIC) of embedded control systems with hard real-time constraints. We present a transforma...
Xu Ke, Paul Pettersson, Krzysztof Sierszecki, Chri...