This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
erise_2012 [2013/04/08 17:58] katsiaryna.labunets@unitn.it [Experimental Procedure] |
erise_2012 [2013/04/08 17:59] katsiaryna.labunets@unitn.it [Evaluated Methods] |
||
---|---|---|---|
Line 4: | Line 4: | ||
To have a glimpse of eRISE 2012 you can look a video on YouTube [[http://youtu.be/hyxg56RTQsw|eRISE 2012]]. | To have a glimpse of eRISE 2012 you can look a video on YouTube [[http://youtu.be/hyxg56RTQsw|eRISE 2012]]. | ||
==== Participants ==== | ==== Participants ==== | ||
+ | {{ :research_activities:erise:erise_2012:photo:training01.jpeg?250|}} | ||
In eRISE 2012 were involved the following participants: | In eRISE 2012 were involved the following participants: | ||
* **Customers** | * **Customers** | ||
Line 26: | Line 27: | ||
==== Evaluated Methods ==== | ==== Evaluated Methods ==== | ||
- | {{ :research_activities:erise:erise_2012:photo:training.jpeg?200|}} | + | {{ :research_activities:erise:erise_2012:photo:training.jpeg?250|}} |
The selection of the security requirements methods to be evaluated was driven | The selection of the security requirements methods to be evaluated was driven | ||
by three main factors: the number of citations, the fact that research on the | by three main factors: the number of citations, the fact that research on the |