Karan Singh Web Application Performance Requirements
نویسنده
چکیده
منابع مشابه
Elicitation Strategies for Web Application Using Activity Theory
Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...
متن کاملElicitation Strategies for Web Application Using Activity Theory
Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...
متن کاملFramework for Tagging Software in Web Application
Tagging is included in web application to ease maintenance of large amount of information stored in a web application. With no mention of requirement specification or design document for tagging software, academically or otherwise, integrating tagging software in a web application is a tedious task. In this paper, a framework is presented for integrating tagging software into a web application....
متن کاملRequirement Estimation and Design of Tag software in Web Application
Tag software is included in a web application to facilitate categorization and classification of information. Generally, freely available tag software is adapted, or new code is written to incorporate tagging functionality. Since there is an absence of requirement specification and design document for tag software, even academically, it becomes difficult for the user to know about the possible ...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کامل