The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Identifying strengths and weaknesses in requirements engineering (RE) activities and deriving corresponding improvement and rectification recommendations are the main goals of the presented content-based RE assessment approach, which relies on a well-founded RE reference model. Two representative examples from our case study pool, carried out for companies with established RE practices in different...
The increasing awareness about the importance of requirements engineering (RE) has tempted many enterprises to invest effort in the improvement of their corresponding RE processes. Many small and medium sized enterprises (SME) have less budget and effort available for improvement work and lack the in-house competence to make the improvements on their own. To compensate the lack of know-how in RE,...
In agent bilateral multi-issue bidding negotiation protocol, how to make the negotiation agents gain satisfying result farthest and negotiate efficiently is a key issue. As for this problem, a genetic algorithm based on metropolis rule is present in the protocol and the algorithm is applied in bilateral multi-issue simultaneous bidding negotiation protocol in E-commerce. In the protocol, the negotiation...
Systems verification requires first to model the system to be verified, then to formalize the properties to be satisfied, and finally to describe the behaviour of the environment. This last point, known as the proof context, is often neglected. It could, however, be of great importance in order to reduce the complexity of the proof. The question is then how to formalize such a proof context. This...
Modern business process modeling languages such as BPMN or EPC provide users with more constructs to represent real world situations than their predecessors such as IDEF or Petri Nets. But this apparent increase in expressiveness is accompanied by an increase in language complexity. In practice many organizations choose to only use a subset of the available modeling constructs. Using a well established...
An important issue to the adoption of any enterprise architectural approach is the availability of tools to support the development, storage, presentation, analysis, improvement and evolution of enterprise architecture representations. As with enterprise architecture methodologies, enterprise architecture tools to support the architectural development process are still emerging. Most important software...
Information privacy typically concerns the confidentiality of personal identifiable information (PII) and protected health information (PHI) such as electronic medical records. Thus, the information access control mechanism for e-health services must be embedded with privacy-enhancing technologies. Role-based access control (RBAC) model has been widely investigated and applied to various applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.