Large, global enterprises are increasingly faced with the problem of supporting employees that are on the move. Employees need to share business documents, locate expertise and kn...
Engin Kirda, Harald Gall, Pascal Fenkam, Gerald Re...
The method of choice of the software reliability models based on the analysis of assumptions and compatibility both input and output parameters is offered. This method is illustra...
Vyacheslav S. Kharchenko, O. M. Tarasyuk, Vladimir...
Web applications are becoming more complex and the way to manage that complexity is to model them. This paper presents a methodology to model Web applications directly from the ob...
Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC’...
The Integration of complex systems out of existing systems is an active area of research and development. There are many practical situations in which the interfaces of the compon...
Cliff B. Jones, Alexander B. Romanovsky, Ian Welch
Many software projects have failed because their requirements were poorly negotiated among stakeholders. This paper proposes a systematic model, called "MultiCriteria Prefere...
a Abstract— Source code copying for reuse (code cloning) is often observed in software implementations. Such code cloning causes difficulty when software functionalities are mod...