Sciweavers

362 search results - page 2 / 73
» Facilitating Requirements Engineering of Semantic Applicatio...
Sort
View
SIGSOFT
2005
ACM
14 years 5 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
TSE
1998
115views more  TSE 1998»
13 years 4 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon
WCRE
1995
IEEE
13 years 8 months ago
Strongest Postcondition Semantics as the Formal Basis for Reverse Engineering
Reverse engineering of program code is the process of constructing a higher level abstraction of an implementation in order to facilitate the understanding of a system that may be...
Gerald C. Gannod, Betty H. C. Cheng
ICSM
2008
IEEE
13 years 11 months ago
Supporting requirements reuse in multi-agent system product line design and evolution
A principal goal of agent-oriented software engineering (AOSE) is to provide the mechanisms for reusing, maintaining and allowing the evolution of agent-based software systems. Ou...
Josh Dehlinger, Robyn R. Lutz
OHS
2001
Springer
13 years 9 months ago
Revisiting and Versioning in Virtual Special Reports
Adaptation/personalization is one of the main issues for web applications and require large repositories. Creating adaptive web applications from these repositories requires to hav...
Sébastien Iksal, Serge Garlatti