Sciweavers

3792 search results - page 91 / 759
» Techniques for Trusted Software Engineering
Sort
View
CSEE
2009
Springer
15 years 10 months ago
Evaluating Software Inspection Cognition Levels Using Bloom's Taxonomy
This paper reports on results from a pilot study that used Bloom’s Taxonomy to observe cognition levels during software inspections conducted by undergraduate computer science a...
David A. McMeekin, Brian R. von Konsky, Elizabeth ...
RE
2002
Springer
15 years 3 months ago
Requirements Engineering in the Health Care Domain
There are many different approaches to elicit requirements each having its strengths and weaknesses. Hence, some approaches may be ore suitable to one domain then another. Moreove...
Luiz Marcio Cysneiros
111
Voted
ICSM
2008
IEEE
15 years 10 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos
122
Voted
WSC
2008
15 years 5 months ago
How to build better models: Applying agile techniques to simulation
For simulation practitioners, the common steps in a simulation modeling engagement are likely familiar: problem assessment, requirements specification, model building, verificatio...
James T. Sawyer, David M. Brann
156
Voted
UML
2005
Springer
15 years 9 months ago
Visualization in the Context of Model Driven Engineering
Understanding and maintenance of complex information spaces is often supported through visual interfaces. These interfaces must be highly flexible in order to adapt to both the u...
R. Ian Bull, Jean-Marie Favre