Sciweavers

1739 search results - page 220 / 348
» Writing Good Software Engineering Research Paper
Sort
View
ICRE
1996
IEEE
14 years 1 months ago
Structuring utterance records of requirements elicitation meetings based on speech act theory
This paper discusses a technique to structure utterance records of the meetings for requirements elicitation based on speech act theory. To elicit requirements to the system to be...
Motoshi Saeki, Kinji Matsumura, Jun'ichi Shimoda, ...
EUROMICRO
2009
IEEE
14 years 25 days ago
Composition of Self Descriptive Protocols for Future Network Architectures
The network protocols we use today have been introduced decades ago. Since then the whole Internet came to existence and with it a single protocol stack: TCP/IP. What was a good s...
Dennis Schwerdel, Abbas Siddiqui, Bernd Reuther, P...
ICAIL
2007
ACM
14 years 25 days ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
ESEM
2009
ACM
14 years 7 days ago
An empirical study of security problem reports in Linux distributions
Existing studies on problem reports in open source projects focus primarily on the analysis of the general category of problem reports, or limit their attention to observations on...
Prasanth Anbalagan, Mladen A. Vouk
AVI
2004
13 years 10 months ago
Sketch-based retrieval of ClipArt drawings
These days there are a lot of vector drawings available for people to integrate into documents. These come in a variety of formats, such as Corel, Postscript, CGM, WMF and recentl...
Manuel J. Fonseca, Bruno Barroso, Pedro Ribeiro, J...