Sciweavers

2351 search results - page 18 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
PDCAT
2007
Springer
15 years 5 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling
SAFECOMP
2000
Springer
15 years 3 months ago
Controlling Requirements Evolution: An Avionics Case Study
This paper presents an empirical investigation of the control of requirements evolution in an avionics safety-critical system. Metrics can be used to manage (e.g., control and pred...
Stuart Anderson, Massimo Felici
ICDCIT
2004
Springer
15 years 5 months ago
Secure Requirements Elicitation Through Triggered Message Sequence Charts
Abstract. This paper argues for performing information-flow-based security analysis in the first phaseof the software development life cycle itself ie in the requirements elicita...
Arnab Ray, Bikram Sengupta, Rance Cleaveland
AGILEDC
2006
IEEE
15 years 5 months ago
Executable Acceptance Tests for Communicating Business Requirements: Customer Perspective
Using an experimental method, we found that customers, partnered with an IT professional, are able to use executable acceptance test (storytest)-based specifications to communicat...
Grigori Melnik, Frank Maurer, Mike Chiasson
KDD
2002
ACM
93views Data Mining» more  KDD 2002»
16 years 4 days ago
Interactive deduplication using active learning
Deduplication is a key operation in integrating data from multiple sources. The main challenge in this task is designing a function that can resolve when a pair of records refer t...
Sunita Sarawagi, Anuradha Bhamidipaty