Now showing items 11-20 of 335
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
Identifying security requirements early on can lay the foundation for secure software development. Security requirements are often implied by existing functional requirements but are mostly left unspecified. The Security ...
A contribuição de stakeholders não técnicos na elicitação de aspectos da experiência do usuário: uma abordagem usando proto-personas
(Universidade Federal de São CarlosUFSCarPrograma de Pós-graduação em Ciência da Computação (Campus SOROCABA)Câmpus Sorocaba, 2018-02-06)
The requirements elicitation is a main step in an application development. Usually the requirements are listed and described with little to none participation of the stakeholders that have knowledge of the application’s ...
Curcumin requires tumor necrosis Factor α signaling to alleviate cognitive impairment elicited by Lipopolysaccharide
A decline in cognitive ability is a typical feature of the normal aging process, and of neurodegenerative disorders such as Alzheimer’s, Parkinson’s and Huntington’s diseases. Although their etiologies differ, all of these ...
Modelos de decisão multicritério e de portfólio com aplicação na construção de políticas energéticas sustentáveis
(Universidade Federal de PernambucoUFPEBrasilPrograma de Pos Graduacao em Engenharia de Producao, 2017)