Towards a catalog of conflicts for HCI quality characteristics in UbiComp and IoT applications: Process and first results
暂无分享,去创建一个
Káthia Marçal de Oliveira | Rossana M. de Castro Andrade | Rainara Maia Carvalho | K. Oliveira | Rossana Andrade | R. M. Carvalho
[1] Káthia Marçal de Oliveira,et al. Evaluating an IoT Application Using Software Measures , 2017, HCI.
[2] Káthia Marçal de Oliveira,et al. Quality characteristics and measures for human–computer interaction evaluation in ubiquitous systems , 2017, Software Quality Journal.
[3] Apostolos Ampatzoglou,et al. Investigating quality trade-offs in open source Critical Embedded Systems , 2015, 2015 11th International ACM SIGSOFT Conference on Quality of Software Architectures (QoSA).
[4] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[5] Jukka Riekki,et al. Evaluating the Calmness of Ubiquitous Applications , 2004, PROFES.
[6] Káthia Marçal de Oliveira,et al. AQUArIUM - A suite of software measures for HCI quality evaluation of ubiquitous mobile applications , 2018, J. Syst. Softw..
[7] Fabio Massacci,et al. The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals , 2015, REFSQ.
[8] Didar Zowghi,et al. An ontological framework to manage the relative conflicts between security and usability requirements , 2010, 2010 Third International Workshop on Managing Requirements Knowledge.
[9] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[10] Káthia Marçal de Oliveira,et al. What Changes from Ubiquitous Computing to Internet of Things in Interaction Evaluation? , 2017, HCI.
[11] Mark T True,et al. Software Requirements , 2005 .
[12] Dharma P. Agrawal,et al. Choices for interaction with things on Internet and underlying issues , 2015, Ad Hoc Networks.
[13] Alexander Egyed,et al. Identifying requirements conflicts and cooperation: how quality attributes and automated traceability can help , 2004, IEEE Software.
[14] Luiz Marcio Cysneiros,et al. Evaluating the Effectiveness of Using Catalogues to Elicit Non-Functional Requirements , 2007, WER.
[15] Mohd. Sadiq,et al. A Taxonomy of Software’s Non-functional Requirements , 2016 .
[16] Maurício Serrano,et al. Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue , 2013, ER@BR.
[17] Didar Zowghi,et al. Constructing a Catalogue of Conflicts among Non-functional Requirements , 2010, ENASE.
[18] Jiannong Cao,et al. Application mobility in pervasive computing: A survey , 2013, Pervasive Mob. Comput..
[19] George M. Giaglis,et al. Delineating the Degree of 'Pervasiveness' in Pervasive Information Systems: An Assessment Framework and Design Implications , 2008, 2008 Panhellenic Conference on Informatics.
[20] Giancarlo Guizzardi,et al. A Method for Eliciting Goals for Business Process Models based on Non-Functional Requirements Catalogues , 2011, Int. J. Inf. Syst. Model. Des..
[21] Jean Scholtz,et al. Toward a Framework for Evaluating Ubiquitous Computing Applications , 2004, IEEE Pervasive Comput..
[22] Gian Luigi Ferrari,et al. Formalising Security in Ubiquitous and Cloud Scenarios , 2012, CISIM.
[23] Rossana M. de Castro Andrade,et al. Requirements and challenges for building service-oriented pervasive middleware , 2009, ICPS '09.
[24] Amitava Mukherjee,et al. Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.
[25] Anurag Agarwal,et al. The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.