Sciweavers

523 search results - page 52 / 105
» Goal-Oriented Requirements Engineering: A Case Study in E-go...
Sort
View
COMPSAC
2005
IEEE
15 years 7 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
WER
2007
Springer
15 years 7 months ago
Guidelines for Business Modeling Elaboration based on Views from Domain Information
Business modeling is an activity of the Requirements Engineering that involves a knowledge process of the organization and provides a specific business domain view. On this proces...
Silvia Angelica Zanco Ladeira, Maria Istela Cagnin
ICSE
2009
IEEE-ACM
16 years 2 months ago
CloneDetective - A workbench for clone detection research
The area of clone detection has considerably evolved over the last decade, leading to approaches with better results, but at the same time using more elaborate algorithms and tool...
Benjamin Hummel, Elmar Jürgens, Florian Deiss...
RE
2007
Springer
15 years 7 months ago
Specifying Monitoring and Switching Problems in Context
Context-aware applications monitor changes in their operating environment and switch their behaviour to keep satisfying their requirements. Therefore, they must be equipped with th...
Mohammed Salifu, Yijun Yu, Bashar Nuseibeh
CSMR
2005
IEEE
15 years 7 months ago
Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach
Software developers are constantly required to modify and adapt application features in response to changing requirements. The problem is that just by reading the source code, it ...
Orla Greevy, Stéphane Ducasse