Sciweavers

2351 search results - page 18 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
PDCAT
2007
Springer
15 years 3 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling
SAFECOMP
2000
Springer
15 years 1 months ago
Controlling Requirements Evolution: An Avionics Case Study
This paper presents an empirical investigation of the control of requirements evolution in an avionics safety-critical system. Metrics can be used to manage (e.g., control and pred...
Stuart Anderson, Massimo Felici
ICDCIT
2004
Springer
15 years 3 months ago
Secure Requirements Elicitation Through Triggered Message Sequence Charts
Abstract. This paper argues for performing information-flow-based security analysis in the first phaseof the software development life cycle itself ie in the requirements elicita...
Arnab Ray, Bikram Sengupta, Rance Cleaveland
AGILEDC
2006
IEEE
15 years 3 months ago
Executable Acceptance Tests for Communicating Business Requirements: Customer Perspective
Using an experimental method, we found that customers, partnered with an IT professional, are able to use executable acceptance test (storytest)-based specifications to communicat...
Grigori Melnik, Frank Maurer, Mike Chiasson
KDD
2002
ACM
93views Data Mining» more  KDD 2002»
15 years 10 months ago
Interactive deduplication using active learning
Deduplication is a key operation in integrating data from multiple sources. The main challenge in this task is designing a function that can resolve when a pair of records refer t...
Sunita Sarawagi, Anuradha Bhamidipaty