Sciweavers

362 search results - page 2 / 73
» Facilitating Requirements Engineering of Semantic Applicatio...
Sort
View
SIGSOFT
2005
ACM
15 years 10 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
TSE
1998
115views more  TSE 1998»
14 years 9 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon
WCRE
1995
IEEE
15 years 1 months ago
Strongest Postcondition Semantics as the Formal Basis for Reverse Engineering
Reverse engineering of program code is the process of constructing a higher level abstraction of an implementation in order to facilitate the understanding of a system that may be...
Gerald C. Gannod, Betty H. C. Cheng
ICSM
2008
IEEE
15 years 4 months ago
Supporting requirements reuse in multi-agent system product line design and evolution
A principal goal of agent-oriented software engineering (AOSE) is to provide the mechanisms for reusing, maintaining and allowing the evolution of agent-based software systems. Ou...
Josh Dehlinger, Robyn R. Lutz
OHS
2001
Springer
15 years 2 months ago
Revisiting and Versioning in Virtual Special Reports
Adaptation/personalization is one of the main issues for web applications and require large repositories. Creating adaptive web applications from these repositories requires to hav...
Sébastien Iksal, Serge Garlatti