Strategy-guided requirements development and validation (Englisch)
- Neue Suche nach: Cui, Xiaofeng
- Neue Suche nach: Paige, Richard
- Neue Suche nach: Cui, Xiaofeng
- Neue Suche nach: Paige, Richard
In:
15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
;
1-6
;
2014
-
ISBN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Strategy-guided requirements development and validation
-
Beteiligte:Cui, Xiaofeng ( Autor:in ) / Paige, Richard ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.06.2014
-
Format / Umfang:233843 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
New approach on PCA-based 3D face recognition and authenticationKhadhraoui, Taher / Benzarti, Faouzi / Amiri, Hamid et al. | 2014
- 1
-
Error value driven fault analysis attackYoshikawa, Masaya / Goto, Hikaru / Asahi, Kensaku et al. | 2014
- 1
-
Strategy-guided requirements development and validationCui, Xiaofeng / Paige, Richard et al. | 2014
- 1
-
Test image generation using segmental symbolic evaluation for unit testingJameel, Tahir / Lin, Mengxiang / Li, He / Hou, Xiaomei et al. | 2014
- 1
-
Consideration of cross-validation in estimating objective scores of answer statements posted at Q&A sitesYokoyama, Yuya / Hochin, Teruhisa / Nomiya, Hiroki et al. | 2014
- 1
-
Proposal of eye-gaze recognize method for input interface without infra-red ray equipmentFukushima, Kazuki / Shirahama, Naruki et al. | 2014
- 1
-
Author index| 2014
- 1
-
VMKit: Improving design and performance of Managed Runtime EnvironmentsFolliot, Bertil et al. | 2014
- 1
-
Converting PCAPs into Weka mineable dataFowler, Charles A. / Hammel, Robert J. et al. | 2014
- 1
-
Security and privacy protocol for emerging smart RFID applicationsSadikin, Mohammad Fal / Kyas, Marcel et al. | 2014
- 1
-
New data warehouse designing approach based on principal component analysisTebourski, Wafa / Ben Abdessalem Kara, Wahiba / Ben Ghezela, Henda et al. | 2014
- 1
-
An improvement of micro area selection technique for the diffusion of ICT infrastructureIwashita, Motoi / Kurosawa, Takeshi / Inoue, Akiya / Nishimatsu, Ken et al. | 2014
- 1
-
An obfuscation method to build a fake call flow graph by hooking method callsFukuda, Kazumasa / Tamada, Haruaki et al. | 2014
- 1
-
Applications of ultrasonic sensors and obrid-sensor in safety confirmation system for eldersMu, Shenglin / Nakashima, Shota / Tanaka, Kanya et al. | 2014
- 1
-
One dimensional ring type growing SOM with asymmetric neighborhood function and its application to a hand shape instruction learning systemKuremoto, Takashi / Otani, Takuhiro / Obayashi, Masanao / Kobayashi, Kunikazu / Mabu, Shingo et al. | 2014
- 1
-
VM scheduling strategies based on artificial intelligence in Cloud TestingZheng, Yang / Cai, Lizhi / Huang, Shidong / Wang, Zhihong et al. | 2014
- 1
-
Collaborative filtering recommendation algorithm based on item attributesHuang, Mengxing / Sun, Longfei / Du, Wencai et al. | 2014
- 1
-
Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) requirementsKim, Haeng-Kon et al. | 2014
- 1
-
Generation of reducts based on nearest neighbor relationIshii, Naohiro / Torii, Ippei / Nakashima, Toyoshiro / Iwata, Kazunori et al. | 2014
- 1
-
Using client-side access partitioning for data clustering in big data applicationsLiu, Dapeng / Xu, Shaochun / Cui, Zengdi et al. | 2014
- 1
-
Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature schemeSha, Limin et al. | 2014
- 1
-
Developing and building a quality management system based on stakeholder behavior for enterprise architectureMezzanotte, Dominic M. / Dehlinger, Josh et al. | 2014
- 1
-
Optimizing mapreduce with low memory requirements for shared-memory systemsZheng, Yasong / Xu, Yuanchao / Meng, Haibo / Ye, Xiaochun / Fan, Lingjun / Miao, Futao / Fan, Dongrui et al. | 2014
- 1
-
A dialogue-based framework for the user experience reengineering of a legacy applicationMartella, Angelo / Paiano, Roberto / Pandurino, Andrea et al. | 2014
- 1
-
A requirements description language pLSC for probabilistic branches and three-stage eventsKai, Jinyu / Miao, Huaikou / Gao, Honghao et al. | 2014
- 1
-
Design patterns applied for networked first person shooting game programmingQu, Junfeng / Wei, Yong / Song, Yinglei et al. | 2014
- 1
-
A proposal of cloud-based home network system for multi-vendor servicesTakatori, Satoshi / Matsumoto, Shinsuke / Saiki, Sachio / Nakamura, Masahide et al. | 2014
- 1
-
An application of 3D spiral visualization to the Uchida-Kraepelin psychodiagnostic testHeliang, Zhuang / Sugimoto, Futoshi / Kato, Chieko / Tsuchida, Kensei et al. | 2014
- 1
-
Modeling web application for cross-browser compatibility testingLi, Xinxin / Zeng, Hongwei et al. | 2014
- 1
-
Can text mining technique be used as an alternative tool for qualitative research in education?Lee, Carl / Cheng, Chin-I / Zeleke, Aklilu et al. | 2014
- 1
-
A theoretical exploration of the impact of packet loss on network intrusion detectionSmith, Sidney C. / Hammell, Robert J. / Parker, Travis W. / Marvel, Lisa M. et al. | 2014
- 1
-
AES-128 ECB encryption on GPUs and effects of input plaintext patterns on performanceKhan, A. H. / Al-Mouhamed, M. A. / Almousa, A. / Fatayar, A. / Ibrahim, A. R. / Siddiqui, A. J. et al. | 2014
- 1
-
An efficient reduction approach to test suiteLiu, Pan et al. | 2014
- 1
-
Dynamic test case prioritization based on multi-objectiveWang, Xiaolin / Zeng, Hongwei et al. | 2014
- 1
-
[Title Page]| 2014
- 1
-
Non-functional properties aware configuration selection in component-based systemsEddin, Mohammad Charaf / Mammeri, Zoubir et al. | 2014
- 1
-
Training of intelligent intrusion detection system using neuro fuzzyPanja, Biswajit / Ogunyanwo, Olugbenga / Meharia, Priyanka et al. | 2014
- 1
-
Comparing hierarchical dirichlet process with latent dirichlet allocation in bug report multiclass classificationLimsettho, Nachai / Hata, Hideaki / Matsumoto, Ken-ichi et al. | 2014
- 1
-
Novice and expert, how are they programming differently?Xu, Simon et al. | 2014
- 1
-
An energy balanced topology construction protocol for Wireless Sensor NetworksSaha, Soumya / McLauchlan, Lifford et al. | 2014
- 1
-
Software development concerns in the building of service-oriented based enterprise systemsChiang, Chia-Chu et al. | 2014
- 1
-
Designing and implementing service framework for virtual agents in home network systemHoriuchi, Hiroyasu / Saiki, Sachio / Matsumoto, Shinsuke / Nakamura, Masahide et al. | 2014
- 1
-
Using goal net to model user stories in agile software developmentLin, Jun / Yu, Han / Shen, Zhiqi / Miao, Chunyan et al. | 2014
- 1
-
On simplification of chaotic neural network on incremental learningDeguchi, Toshinori / Takahashi, Toshiki / Ishii, Naohiro et al. | 2014
- 1
-
Brain activity measurement during program comprehension with NIRSIkutani, Yoshiharu / Uwano, Hidetake et al. | 2014
- 1
-
A data structure for triangular dissection of multi-resolution imagesKikuchi, Taiyou / Koka, Shinji / Anada, Koichi / Miyadera, Youzou / Yaku, Takeo et al. | 2014
- 1
-
Detection range fitting of slit type Obrid-SensorNakashima, Shota / Mu, Shenglin / Ichikawa, Tatsuya / Tomimoto, Hiromasa / Okabe, Shintaro / Tanaka, Kanya / Kitazono, Yuhki / Serikawa, Seiichi et al. | 2014
- 1
-
Microcredit risk assessment using crowdsourcing and social networksHasanov, Tofig / Ozeki, Motoyuki / Oka, Natsuki et al. | 2014
- 1
-
Hierarchical speech recognition system using MFCC feature extraction and dynamic spiking RSOMTarek, Behi / Najet, Arous / Noureddine, Ellouze et al. | 2014
- 1
-
Jade: An efficient energy-aware computation offloading system with heterogeneous network interface bonding for ad-hoc networked mobile devicesQian, Hao / Andresen, Daniel et al. | 2014
- 1
-
A source code plagiarism detecting method using alignment with abstract syntax tree elementsKikuchi, Hiroshi / Goto, Takaaki / Wakatsuki, Mitsuo / Nishino, Tetsuro et al. | 2014
- 1
-
Development of Leaving-bed Detection System to Prevent Midnight ProwlTakahashi, Yuhki / Kitazono, Yuhki / Nakashima, Shota et al. | 2014
- 1
-
Big data in memory: Benchimarking in memory database using the distributed key-value store for machine to machine communicationIwazume, Michiaki / Iwase, Takahiro / Tanaka, Kouji / Fujii, Hideaki / Hijiya, Makoto / Haraguchi, Hiroshi et al. | 2014
- 1
-
Survey of attribute based encryptionQiao, Zhi / Liang, Shuwen / Davis, Spencer / Jiang, Hai et al. | 2014
- 1
-
A machine learning technique for predicting the productivity of practitioners from individually developed software projectsLopez-Martin, Cuauhtemoc / Chavoya, Arturo / Meda-Campana, Maria Elena et al. | 2014
- 1
-
Scalable bootstrap clustering for massive dataWang, Haocheng / Zhuang, Fuzhen / Ao, Xiang / He, Qing / Shi, Zhongzhi et al. | 2014
- 1
-
Padding free bank conflict resolution for CUDA-based matrix transpose algorithmKhan, A. / Al-Mouhamed, M. / Fatayar, A. / Almousa, A. / Baqais, A. / Assayony, M. et al. | 2014
- 1
-
Considerations on pauses and fundamental movements for transmitting traditional skillsHochin, Teruhisa / Nomiya, Hiroki et al. | 2014
- 1
-
Multisensory images evoked by olfactory stimuli: Crossmodal correspondences in human information processingIchihashi, Kazuyoshi / Ichihashi, Hideki et al. | 2014
- 1
-
Development of input assistance application for mobile devices for physically disabledShirahama, Naruki / Sakuragi, Yuki / Watanabe, Satoshi / Nakaya, Naofumi / Mori, Yukio / Miyamoto, Kazunori et al. | 2014
- 1
-
Questionnaire report on matter relating to software architecture evaluationAlmari, Hassan / Boughton, Clive et al. | 2014
- 1
-
Analysis and acceleration of NTRU lattice-based cryptographic systemBai, Tianyu / Davis, Spencer / Li, Juanjuan / Jiang, Hai et al. | 2014
- 1
-
Post processing for dense stereo matching by iterative local plane fittingLu, Hongbo / Meng, Haibo / Du, Kun / Sun, Yuan / Xu, Yuanchao / Zhang, Zhimin et al. | 2014
- 1
-
The analysis method focusing on peaks of darkness for the impression evaluation method by spaceAkai, Shunsuke / Hochin, Teruhisa / Nomiya, Hiroki et al. | 2014
- 1
-
A rule-based framework for managing context-aware services based on heterogeneous and distributed Web servicesTakatsuka, Hiroki / Saiki, Sachio / Matsumoto, Shinsuke / Nakamura, Masahide et al. | 2014
- 1
-
Software ontology design to support organized open source software developmentSalam Khan, Md. Mahfuzus / Salam Khan, Md. Anwarus / Goto, Takaaki / Nishino, Tetsuro / Debnath, Narayan et al. | 2014
- 1
-
An efficient structure for LKH key tree on secure multicast communicationsSakamoto, Naoshi et al. | 2014
- 1
-
Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devicesCha, Shi-Cho / Joung, Yuh-Jzer / Tseng, Yen-Chung / Huang, Shih-Chieh / Chen, Guan-Heng / Tseng, Chih-Teng et al. | 2014
- 1
-
Refinement/verification of early stage probabilistic software project schedules in the planning stageKwon, Donghwoon / Hammell, Robert J. et al. | 2014
- 1
-
Toward a dynamic analysis technique to locate framework misuses that cause unexpected side effectsKume, Izuru / Nakamura, Masahide / Nitta, Naoya / Shibayama, Etsuya et al. | 2014
- 1
-
Feature selection method based on crossed centroid for text categorizationYang, Jieming / Liu, Zhiying / Qu, Zhaoyang / Wang, Jing et al. | 2014
- 1
-
ONTOSSN: Scientific social network ontologyAhmed, Eya Ben / Tebourski, Wafa / Ben Abdessalem Karaa, Wahiba / Gargouri, Faiez et al. | 2014
- 1
-
Dynamic artificial immune system and its application to File Transfer Scheduling optimizationZand, Milad Dastan / Kalantari, Mohammad / Golzari, Shahram et al. | 2014
- 1
-
A framework for mobile elearning (mLearning) with analytical decision modelDewan, Jahangir / Chowdhury, Morshed et al. | 2014
- 1
-
Unbinds data and tasks to improving the Hadoop performanceLu, Kun / Dai, Dong / Zhou, Xuehai / Sun, Mingming / Li, Changlong / Zhuang, Hang et al. | 2014
- 1
-
High performance and grid computing with quality of service controlSait, Sadiq M. / Al-Shaikh, Raed et al. | 2014
- 1
-
Risk assessment quantification in life log serviceTanimoto, Shigeaki / Takahashi, Ken / Yabuki, Taro / Kato, Kazuhiko / Iwashita, Motoi / Sato, Hiroyuki / Kanai, Atsushi et al. | 2014
- 1
-
Pitfalls of analyzing a cross-company dataset of software maintenance and supportTsunoda, Masateru / Ono, Kenichi et al. | 2014
- 1
-
A self-tuned bat algorithm for optimization in radiation therapy treatment planningKalantzis, Georgios / Lei, Yu et al. | 2014
- iii
-
International program committee| 2014
- v
-
Message from conference chair| 2014
- vi
-
Message from program chairs| 2014
- vii
-
Table of contents| 2014