Sciweavers

3792 search results - page 123 / 759
» Techniques for Trusted Software Engineering
Sort
View
RE
2001
Springer
15 years 8 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
119
Voted
RE
2008
Springer
15 years 3 months ago
Clear justification of modeling decisions for goal-oriented requirements engineering
Representation and reasoning about goals of an information system unavoidably involve the transformation of unclear stakeholder requirements into an instance of a goal model. If t...
Ivan Jureta, Stéphane Faulkner, Pierre-Yves...
146
Voted
ICDE
2012
IEEE
232views Database» more  ICDE 2012»
13 years 6 months ago
Horton: Online Query Execution Engine for Large Distributed Graphs
—Large graphs are used in many applications, such as social networking. The management of these graphs poses new challenges because such graphs are too large to fit on a single ...
Mohamed Sarwat, Sameh Elnikety, Yuxiong He, Gabrie...
125
Voted
REFSQ
2009
Springer
15 years 10 months ago
Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective
Abstract. [Context and motivation] Ever-growing systems’ complexity and novel requirements engineering approaches such as reuse or globalization imply that requirements are produ...
Gilles Perrouin, Erwan Brottier, Benoit Baudry, Yv...
134
Voted
KBSE
2006
IEEE
15 years 9 months ago
Reverse Engineering of Design Patterns from Java Source Code
Recovering design patterns can enhance existing source code analysis tools by bringing program understanding to the design level. This paper presents a new, fully automated patter...
Nija Shi, Ronald A. Olsson