Sciweavers

1153 search results - page 128 / 231
» Compositional Specification Calculus for Information Systems...
Sort
View
116
Voted
AOSE
2005
Springer
15 years 9 months ago
Requirements Elicitation for Agent-Based Applications
Requirements elicitation for a software system is a key stage in a successful development. At the same time, it is one of the most challenging, because requirements have to conside...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
SNPD
2008
15 years 5 months ago
An Approach to Modeling Software Safety
: Software for safety-critical systems has to deal with the hazards identified by safety analysis in order to make the system safe, risk-free and fail-safe. Software safety is a co...
M. Ben Swarup, P. Seetha Ramaiah
JUCS
2006
138views more  JUCS 2006»
15 years 3 months ago
The Impact of Behavioral Monitoring Technology on the Provision of Health Care in the Home
: The lack of appropriate and accurate information on the ability of a frail individual to accomplish specific task oriented activities can place the individual at risk or result i...
Anthony P. Glascock, David M. Kutzik
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 8 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
DEBU
2008
100views more  DEBU 2008»
15 years 3 months ago
WAVE: Automatic Verification of Data-Driven Web Services
Data-driven Web services, viewed broadly as interactive systems available on the Web for users and programs, provide the backbone for increasingly complex Web applications. While ...
Alin Deutsch, Victor Vianu