Sciweavers

770 search results - page 85 / 154
» Agile requirements engineering with prototyping: A case stud...
Sort
View
93
Voted
ICSOC
2005
Springer
15 years 4 months ago
A Service Oriented Architecture for Deploying and Managing Network Services
Abstract. New generation network services must be deployed and managed according to the specific customer requirements. In this context, service providers must devise a way to des...
Victor A. S. M. de Souza, Eleri Cardozo
COMPSAC
2005
IEEE
15 years 4 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
WER
2007
Springer
15 years 5 months ago
Guidelines for Business Modeling Elaboration based on Views from Domain Information
Business modeling is an activity of the Requirements Engineering that involves a knowledge process of the organization and provides a specific business domain view. On this proces...
Silvia Angelica Zanco Ladeira, Maria Istela Cagnin
ICSE
2009
IEEE-ACM
15 years 12 months ago
CloneDetective - A workbench for clone detection research
The area of clone detection has considerably evolved over the last decade, leading to approaches with better results, but at the same time using more elaborate algorithms and tool...
Benjamin Hummel, Elmar Jürgens, Florian Deiss...
RE
2007
Springer
15 years 5 months ago
Specifying Monitoring and Switching Problems in Context
Context-aware applications monitor changes in their operating environment and switch their behaviour to keep satisfying their requirements. Therefore, they must be equipped with th...
Mohammed Salifu, Yijun Yu, Bashar Nuseibeh