Sciweavers

2351 search results - page 16 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
SAC
2004
ACM
15 years 3 months ago
Information requirements engineering for data warehouse systems
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Based on interviews with projec...
Robert Winter, Bernhard Strauch
ICSE
2004
IEEE-ACM
15 years 9 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
69
Voted
CAV
2009
Springer
150views Hardware» more  CAV 2009»
15 years 10 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
RE
2006
Springer
14 years 9 months ago
A Case Study in Systematic Improvement of Language for Requirements
The challenges to requirements from linguistic factors are well-known. This work concerns an approach to communicating requirements with greater fidelity among stakeholders throug...
Kimberly S. Wasson
98
Voted
IMCSIT
2010
14 years 7 months ago
Selecting the best strategy in a software certification process
In this paper, we propose the use of the pairwise comparisons (PC) method for selection of strategies for software certification. This method can also be used to rank alternative s...
Waldemar W. Koczkodaj, Vova Babiy, Agnieszka D. Bo...