Sciweavers

2847 search results - page 523 / 570
» The Context-Dependent Role Model
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
14 years 16 days ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
DSD
2009
IEEE
118views Hardware» more  DSD 2009»
14 years 4 days ago
On the Risk of Fault Coupling over the Chip Substrate
—Duplication and comparison has proven to be an efficient method for error detection. Based on this generic principle dual core processor architectures with output comparison ar...
Peter Tummeltshammer, Andreas Steininger
CHI
2008
ACM
13 years 11 months ago
Introducing item response theory for measuring usability inspection processes
Usability evaluation methods have a long history of research. Latest contributions significantly raised the validity of method evaluation studies. But there is still a measurement...
Martin Schmettow, Wolfgang Vietze
BTW
2005
Springer
90views Database» more  BTW 2005»
13 years 11 months ago
The Importance of Being Earnest about Definitions
: Ideas from terminology management, the science of terms and definitions, can be used to improve the quality of software and data models, as well as to facilitate the achievement ...
Susan Thomas
ER
2006
Springer
169views Database» more  ER 2006»
13 years 10 months ago
A More Expressive Softgoal Conceptualization for Quality Requirements Analysis
Initial software quality requirements tend to be imprecise, subjective, idealistic, and context-specific. An extended characterization of the common Softgoal concept is proposed fo...
Ivan Jureta, Stéphane Faulkner, Pierre-Yves...