By Topic

Software, IEE Proceedings -

Issue 6 • Date Dec. 2006

Filter Results

Displaying Results 1 - 3 of 3
  • Identifying tacit knowledge-based requirements

    Publication Year: 2006 , Page(s): 211 - 218
    Cited by:  Papers (4)
    Click to expandAbstract | PDF file iconPDF (439 KB)  

    Requirements may be derived from a number of sources. Determining the source of a given requirement is known as pre-requirements tracing. Typically, some requirements appear that have no clear source, yet stakeholders will attest to the necessity of these requirements. However, such requirements are likely to be based on tacit or tacit-like knowledge embedded in the problem domain. A tool called P... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework for performance engineering of OSPF software

    Publication Year: 2006 , Page(s): 219 - 229
    Click to expandAbstract | PDF file iconPDF (423 KB)  

    The performance of the Open Shortest Path first (OSPF) routing protocol software is presented, which includes measuring its performance, analysing the results, proposing solutions for improvement and evaluating their effect. First, a reusable framework for evaluating the performance of routing software is proposed, which allows to perform reproducible experiments in a controlled environment with d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain-specific language approach to modelling UI architecture of mobile telephony systems

    Publication Year: 2006 , Page(s): 231 - 240
    Cited by:  Papers (2)
    Click to expandAbstract | PDF file iconPDF (426 KB)  

    Although there has been a considerable increase in the use of embedded software including mobile telephony applications, the development of embedded software has not proved so manageable as compared with conventional software. From the experience of working with mobile telephony systems for over three years, it is the author's belief that the huge amount of variance in application logics, not the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.