A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
This paper presents an empirical investigation of the control of requirements evolution in an avionics safety-critical system. Metrics can be used to manage (e.g., control and pred...
Abstract. This paper argues for performing information-flow-based security analysis in the first phaseof the software development life cycle itself ie in the requirements elicita...
Using an experimental method, we found that customers, partnered with an IT professional, are able to use executable acceptance test (storytest)-based specifications to communicat...
Deduplication is a key operation in integrating data from multiple sources. The main challenge in this task is designing a function that can resolve when a pair of records refer t...