Sciweavers

2832 search results - page 29 / 567
» Flexible Modelling for Requirements Engineering
Sort
View
ICSE
2004
IEEE-ACM
16 years 2 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
ICSE
1995
IEEE-ACM
15 years 5 months ago
Software Requirements Negotiation and Renegotiation Aids: A Theory-W Based Spiral Approach
A major problem in requirements engineering is obtaining requirements that address the concerns of multiple stakeholders. An approach to such a problem is the Theory-W based Spira...
Barry W. Boehm, Prasanta K. Bose, Ellis Horowitz, ...
SIGSOFT
2007
ACM
16 years 2 months ago
Reconciling software configuration management and product data management
Product Data Management (PDM) and Software Configuration Management (SCM) are the disciplines of building and controlling the evolution of a complex artifacts; either physical or ...
Germán Vega, Jacky Estublier
ASWEC
2004
IEEE
15 years 5 months ago
Linking UML Models of Design and Requirement
In this paper, both a UML model of requirement and a UML model of a design are defined as a pair of class diagram and a family of sequence diagrams. We then give an unified semant...
Jing Liu, Zhiming Liu, Jifeng He, Xiaoshan Li
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
15 years 6 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt